7.3
CVSSv3

CVE-2015-8708

Published: 11/04/2016 Updated: 28/07/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 7.3 | Impact Score: 3.4 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote malicious users to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.

Vulnerable Product Search on Vulmon Subscribe to Product

claws-mail claws-mail 3.13.1

Vendor Advisories

Debian Bug report logs - #811048 claws-mail: CVE-2015-8708: Incomplete fix for CVE-2015-8614 Package: src:claws-mail; Maintainer for src:claws-mail is Ricardo Mones <mones@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 15 Jan 2016 07:33:10 UTC Severity: important Tags: patch, security, ...