CVE-2015-8708

Stack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.3 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 75%
VendorProductVersion
claws-mailclaws-mail
3.13.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
claws-mail
bullseye
3.17.8-1
fixed
jessie
not-affected
wheezy
not-affected
squeeze
not-affected
bookworm
4.1.1-2
fixed
sid
4.3.0-1
fixed
trixie
4.3.0-1
fixed
macopix
sid
3.4.0+dfsg.1-3
fixed
trixie
3.4.0+dfsg.1-3
fixed
bookworm
3.4.0+dfsg.1-3
fixed
bullseye
3.4.0+dfsg.1-3
fixed
jessie
not-affected
wheezy
not-affected
squeeze
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
claws-mail
cosmic
not-affected
bionic
not-affected
artful
ignored
zesty
ignored
yakkety
ignored
xenial
not-affected
wily
ignored
vivid
ignored
trusty
dne
precise
ignored
macopix
cosmic
not-affected
bionic
not-affected
artful
ignored
zesty
ignored
yakkety
ignored
xenial
not-affected
wily
ignored
vivid
ignored
trusty
dne
precise
ignored