First published: Mon Apr 11 2016(Updated: )
Multiple stack-based buffer overflows in the (1) conv_jistoeuc, (2) conv_euctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail before 3.13.1 allow remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Claws-Mail | <=3.13.0 | |
openSUSE | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8614 has a high severity rating due to the possibility of remote code execution through crafted emails.
To fix CVE-2015-8614, upgrade Claws Mail to version 3.13.1 or later.
CVE-2015-8614 affects all versions of Claws Mail prior to 3.13.1.
Yes, CVE-2015-8614 can be exploited remotely via specially crafted emails.
The functions involved in CVE-2015-8614 are conv_jistoeuc, conv_euctojis, and conv_sjistoeuc in codeconv.c.