First published: Mon Apr 11 2016(Updated: )
Stack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mambo CMS | =3.13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8708 has a severity level of medium due to its potential for remote exploitation via crafted emails.
To fix CVE-2015-8708, users should upgrade to a patched version of Claws Mail or apply any available security updates.
The consequences of CVE-2015-8708 include possible remote code execution and denial of service through a buffer overflow.
Claws Mail version 3.13.1 is specifically affected by CVE-2015-8708.
Currently, the recommended solution is to update to a secure version, as there are no effective workarounds for CVE-2015-8708.