CVE-2015-8614
Gentoo Linux Security Advisory 201606-11
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple stack-based buffer overflows in the (1) conv_jistoeuc, (2) conv_euctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail before 3.13.1 allow remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.
Múltiples desbordamientos de buffer basado en pila en las funciones (1) conv_jistoeuc, (2) conv_euctojis y (3) conv_sjistoeuc en codeconv.c en Claws Mail en versiones anteriores a 3.13.1 permiten a atacantes remotos tener un impacto no especificado a través de un correo electrónico manipulado, implicando la conversión del conjunto de caracteres Japanese.
"DrWhax" of the Tails project reported that Claws Mail is missing range checks in some text conversion functions. A remote attacker could exploit this to run arbitrary code under the account of a user that receives a message from them using Claws Mail.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-21 CVE Reserved
- 2016-01-25 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://git.claws-mail.org/?p=claws.git%3Ba=commit%3Bh=d390fa07f5548f3173dd9cc13b233db5ce934c82 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2015/12/21/10 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2015/12/22/2 | Mailing List |
|
http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.claws-mail.org/news.php | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2016-01/msg00000.html | 2023-11-07 | |
http://www.debian.org/security/2016/dsa-3452 | 2023-11-07 | |
https://security.gentoo.org/glsa/201606-11 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Claws-mail Search vendor "Claws-mail" | Claws-mail Search vendor "Claws-mail" for product "Claws-mail" | <= 3.13.0 Search vendor "Claws-mail" for product "Claws-mail" and version " <= 3.13.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 42.1 Search vendor "Opensuse" for product "Leap" and version "42.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 13.1 Search vendor "Opensuse" for product "Opensuse" and version "13.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 13.2 Search vendor "Opensuse" for product "Opensuse" and version "13.2" | - |
Affected
|