Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-17688
HistoryMay 16, 2018 - 12:00 a.m.

CVE-2017-17688

2018-05-1600:00:00
ubuntu.com
ubuntu.com
8

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

0.008 Low

EPSS

Percentile

82.2%

DISPUTED The OpenPGP specification allows a Cipher Feedback Mode
(CFB) malleability-gadget attack that can indirectly lead to plaintext
exfiltration, aka EFAIL. NOTE: third parties report that this is a problem
in applications that mishandle the Modification Detection Code (MDC)
feature or accept an obsolete packet type, not a problem in the OpenPGP
specification.

Bugs

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

0.008 Low

EPSS

Percentile

82.2%