DescriptionStack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs811048

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
claws-mail (PTS)buster3.17.3-2fixed
sid, trixie4.2.0-2fixed
macopix (PTS)buster1.7.4-6fixed
sid, trixie, bookworm, bullseye3.4.0+dfsg.1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
claws-mailsourcesqueeze(not affected)
claws-mailsourcewheezy(not affected)
claws-mailsourcejessie(not affected)
macopixsource(unstable)(not affected)


[jessie] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied)
[wheezy] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied)
[squeeze] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied; instead all fixed included in DLA-383-1)
- macopix <not-affected> (Incomplete fix not applied)

Search for package or bug name: Reporting problems