PGP/MIME encrypted messages injected into a Vaultive O365 (before 4.5.21) frontend via IMAP or SMTP have their Content-Type changed from 'Content-Type: multipart/encrypted; protocol="application/pgp-encrypted"; boundary="abc123abc123"' to 'Content-Type: text/plain' - this results in the encrypted message being structured in such a way that most PGP/MIME-capable mail user agents are unable to decrypt it cleanly. The outcome is that encrypted mail passing through this device does not work (Denial of Service), and a common real-world consequence is a request to resend the mail in the clear (Information Disclosure).
References
Configurations
History
21 Nov 2024, 03:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/dkg/a1998c861bf2430e0d01d586905b11cb - |
Information
Published : 2017-05-03 20:59
Updated : 2024-11-21 03:31
NVD link : CVE-2017-7229
Mitre link : CVE-2017-7229
CVE.ORG link : CVE-2017-7229
JSON object : View
Products Affected
vaultive
- office_365_security
CWE
CWE-326
Inadequate Encryption Strength