7.3
CVSSv3

CVE-2015-8614

Published: 11/04/2016 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 7.3 | Impact Score: 3.4 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple stack-based buffer overflows in the (1) conv_jistoeuc, (2) conv_euctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail prior to 3.13.1 allow remote malicious users to have unspecified impact via a crafted email, involving Japanese character set conversion.

Vulnerable Product Search on Vulmon Subscribe to Product

claws-mail claws-mail

opensuse leap 42.1

opensuse opensuse 13.1

opensuse opensuse 13.2

Vendor Advisories

Debian Bug report logs - #811048 claws-mail: CVE-2015-8708: Incomplete fix for CVE-2015-8614 Package: src:claws-mail; Maintainer for src:claws-mail is Ricardo Mones <mones@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 15 Jan 2016 07:33:10 UTC Severity: important Tags: patch, security, ...
DrWhax of the Tails project reported that Claws Mail is missing range checks in some text conversion functions A remote attacker could exploit this to run arbitrary code under the account of a user that receives a message from them using Claws Mail For the oldstable distribution (wheezy), this problem has been fixed in version 381-2+deb7u1 For ...