FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2015-8614

This CVE name corresponds to:

Entered Topic
2016-01-19 claws-mail -- no bounds checking on the output buffer in conv_jistoeuc, conv_euctojis, conv_sjistoeuc

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2015-8614
Phase Assigned(20151221)

Description

Multiple stack-based buffer overflows in the (1) conv_jistoeuc, (2) conv_euctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail before 3.13.1 allow remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.

References

Source Reference
MLIST [oss-security] 20151221 Re: mail-client/claws-mail-3.13.1: Stack Overflow - CVE needed?
MLIST [oss-security] 20151221 mail-client/claws-mail-3.13.1: Stack Overflow - CVE needed?
CONFIRM http://git.claws-mail.org/?p=claws.git;a=commit;h=d390fa07f5548f3173dd9cc13b233db5ce934c82
CONFIRM http://www.claws-mail.org/news.php
CONFIRM http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557
GENTOO GLSA-201606-11
SUSE openSUSE-SU-2016:0002