CVE-2015-8708

EUVD-2015-8585
Stack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.3 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
Affected Products (NVD)
VendorProductVersion
claws-mailclaws-mail
3.13.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
claws-mail
bookworm
4.1.1-2
fixed
bullseye
3.17.8-1
fixed
jessie
not-affected
sid
4.3.0-1
fixed
squeeze
not-affected
trixie
4.3.0-1
fixed
wheezy
not-affected
macopix
bookworm
3.4.0+dfsg.1-3
fixed
bullseye
3.4.0+dfsg.1-3
fixed
jessie
not-affected
sid
3.4.0+dfsg.1-3
fixed
squeeze
not-affected
trixie
3.4.0+dfsg.1-3
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
claws-mail
artful
ignored
bionic
not-affected
cosmic
not-affected
precise
ignored
trusty
dne
vivid
ignored
wily
ignored
xenial
not-affected
yakkety
ignored
zesty
ignored
macopix
artful
ignored
bionic
not-affected
cosmic
not-affected
precise
ignored
trusty
dne
vivid
ignored
wily
ignored
xenial
not-affected
yakkety
ignored
zesty
ignored