CVE-2015-8708

Stack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.
Configurations

Configuration 1 (hide)

cpe:2.3:a:claws-mail:claws-mail:3.13.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:39

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2015/12/31/1 - () http://www.openwall.com/lists/oss-security/2015/12/31/1 -
References () https://security.gentoo.org/glsa/201606-11 - Third Party Advisory () https://security.gentoo.org/glsa/201606-11 - Third Party Advisory

Information

Published : 2016-04-11 21:59

Updated : 2024-11-21 02:39


NVD link : CVE-2015-8708

Mitre link : CVE-2015-8708

CVE.ORG link : CVE-2015-8708


JSON object : View

Products Affected

claws-mail

  • claws-mail
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer