CVE-2015-8614

Published: 11 April 2016

Multiple stack-based buffer overflows in the (1) conv_jistoeuc, (2) conv_euctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail before 3.13.1 allow remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.

Priority

Medium

CVSS 3 base score: 7.3

Status

Package Release Status
claws-mail
Launchpad, Ubuntu, Debian
Upstream
Released (3.13.1-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(3.13.2-1ubuntu1)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(3.13.2-1ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(3.13.2-1ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(3.13.2-1ubuntu1)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(3.13.2-1ubuntu1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)
macopix
Launchpad, Ubuntu, Debian
Upstream
Released (1.7.4-6)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable

Ubuntu 20.10 (Groovy Gorilla) Not vulnerable

Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable

Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)