The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft outlook 2007 |
||
horde horde imp - |
||
flipdogsolutions maildroid - |
||
r2mail2 r2mail2 - |
||
apple mail - |
||
bloop airmail - |
||
freron mailmate - |
||
mozilla thunderbird - |
||
emclient emclient - |
||
postbox-inc postbox - |
||
roundcube webmail - |
If a hacker can get into your inbox of ciphered messages, they may be able to read the content PGP and S/MIME decryptors can leak plaintext from emails, says infosec Professor
Security researchers have gone public with vulnerabilities in some secure mail apps that can be exploited by miscreants to decrypt intercepted PGP-encrypted messages. The flaws, collectively dubbed EFAIL, are present in the way some email clients handle PGP and S/MIME encrypted messages. By taking advantage of the way the applications handle HTML content of these messages, an attacker could potentially see encrypted messages as plaintext. In other words, decrypt your secret emails. The research ...