CVE-2015-8614
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
11/04/2016
Last modified:
12/04/2025
Description
Multiple stack-based buffer overflows in the (1) conv_jistoeuc, (2) conv_euctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail before 3.13.1 allow remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.
Impact
Base Score 3.x
7.30
Severity 3.x
HIGH
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:claws-mail:claws-mail:*:*:*:*:*:*:*:* | 3.13.0 (including) | |
| cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.claws-mail.org/?p=claws.git%3Ba%3Dcommit%3Bh%3Dd390fa07f5548f3173dd9cc13b233db5ce934c82
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00000.html
- http://www.claws-mail.org/news.php
- http://www.debian.org/security/2016/dsa-3452
- http://www.openwall.com/lists/oss-security/2015/12/21/10
- http://www.openwall.com/lists/oss-security/2015/12/22/2
- http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557
- https://security.gentoo.org/glsa/201606-11
- http://git.claws-mail.org/?p=claws.git%3Ba%3Dcommit%3Bh%3Dd390fa07f5548f3173dd9cc13b233db5ce934c82
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00000.html
- http://www.claws-mail.org/news.php
- http://www.debian.org/security/2016/dsa-3452
- http://www.openwall.com/lists/oss-security/2015/12/21/10
- http://www.openwall.com/lists/oss-security/2015/12/22/2
- http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557
- https://security.gentoo.org/glsa/201606-11



