CVE-2015-8708

NameCVE-2015-8708
DescriptionStack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: remote)
Debian Bugs811048

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
claws-mail (PTS)wheezy, wheezy (security)3.8.1-2+deb7u1fixed
jessie (security), jessie3.11.1-3+deb8u1fixed
stretch3.14.1-3fixed
buster, sid3.15.1-1fixed
macopix (PTS)wheezy1.7.4-4fixed
jessie1.7.4-5fixed
buster, sid, stretch1.7.4-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
claws-mailsource(unstable)3.13.1-1.1high811048
claws-mailsourcejessie(not affected)
claws-mailsourcesqueeze(not affected)
claws-mailsourcewheezy(not affected)
macopixsource(unstable)(not affected)

Notes

[jessie] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied)
[wheezy] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied)
[squeeze] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied; instead all fixed included in DLA-383-1)
- macopix <not-affected> (Incomplete fix not applied)

Search for package or bug name: Reporting problems