The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/104165 | Third Party Advisory VDB Entry |
| https://efail.de | Exploit Mitigation Third Party Advisory |
| https://news.ycombinator.com/item?id=17066419 | Issue Tracking Third Party Advisory |
| https://pastebin.com/gNCc8aYm | Third Party Advisory |
| https://twitter.com/matthew_d_green/status/996371541591019520 | Third Party Advisory |
| https://www.synology.com/support/security/Synology_SA_18_22 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-05-16 19:29
Updated : 2019-10-03 00:03
NVD link : CVE-2017-17689
Mitre link : CVE-2017-17689
CVE.ORG link : CVE-2017-17689
JSON object : View
Products Affected
flipdogsolutions
- maildroid
emclient
- emclient
kde
- kmail
- trojita
microsoft
- outlook
- gmail
apple
ritlabs
- the_bat
postbox-inc
- postbox
r2mail2
- r2mail2
horde
- horde_imp
mozilla
- thunderbird
9folders
- nine
bloop
- airmail
gnome
- evolution
freron
- mailmate
ibm
- notes
CWE
