CVE-2015-8708

NameCVE-2015-8708
DescriptionStack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh
Debian Bugs811048

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
claws-mail (PTS)stretch3.14.1-3fixed
buster3.17.3-2fixed
bullseye3.17.8-1fixed
bookworm, sid3.18.0-1fixed
macopix (PTS)buster, stretch1.7.4-6fixed
bookworm, sid, bullseye3.4.0+dfsg.1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
claws-mailsourcesqueeze(not affected)
claws-mailsourcewheezy(not affected)
claws-mailsourcejessie(not affected)
claws-mailsource(unstable)3.13.1-1.1811048
macopixsource(unstable)(not affected)

Notes

[jessie] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied)
[wheezy] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied)
[squeeze] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied; instead all fixed included in DLA-383-1)
- macopix <not-affected> (Incomplete fix not applied)

Search for package or bug name: Reporting problems