CVE-2015-8708

NameCVE-2015-8708
DescriptionStack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs811048

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
claws-mail (PTS)jessie, jessie (lts)3.11.1-3+deb8u1fixed
stretch3.14.1-3fixed
buster3.17.3-2fixed
bullseye3.17.8-1fixed
bookworm4.1.1-2fixed
sid, trixie4.3.0-2fixed
macopix (PTS)jessie1.7.4-5fixed
buster, stretch1.7.4-6fixed
sid, bullseye, trixie, bookworm3.4.0+dfsg.1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
claws-mailsourcesqueeze(not affected)
claws-mailsourcewheezy(not affected)
claws-mailsourcejessie(not affected)
claws-mailsource(unstable)3.13.1-1.1811048
macopixsource(unstable)(not affected)

Notes

[jessie] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied)
[wheezy] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied)
[squeeze] - claws-mail <not-affected> (Incomplete fix for CVE-2015-8614 not applied; instead all fixed included in DLA-383-1)
- macopix <not-affected> (Incomplete fix not applied)

Search for package or bug name: Reporting problems