Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8708

Опубликовано: 11 апр. 2016
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
claws-mailfixed3.13.1-1.1package
claws-mailnot-affectedjessiepackage
claws-mailnot-affectedwheezypackage
claws-mailnot-affectedsqueezepackage
macopixnot-affectedpackage

EPSS

Процентиль: 79%
0.01292
Низкий

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 10 лет назад

Stack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.

CVSS3: 7.3
nvd
почти 10 лет назад

Stack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.

CVSS3: 7.3
github
больше 3 лет назад

Stack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614.

EPSS

Процентиль: 79%
0.01292
Низкий