A remotely triggerable buffer overflow has been found in the code of
claws-mail handling character conversion, in functions conv_jistoeuc(),
conv_euctojis() and conv_sjistoeuc(), in codeconv.c.
There was no bounds checking on buffers passed to these functions, some
stack-based but other potentially heap-based.
This issue has been located in the wild and might currently be exploited.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
any | any | any | claws-mail | < 3.13.1-1 | UNKNOWN |
git.claws-mail.org/?p=claws.git;a=blobdiff;f=src/codeconv.c;h=39e259fc6bf31c9f89a591ec5e830fb6de1b3be0;hp=42ac01c21ae7f043db3ba5a6698cc6688af5d298;hb=d390fa07f5548f3173dd9cc13b233db5ce934c82;hpb=03500608c823556578c8ea6fcdb33100fa717ec4
www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557
access.redhat.com/security/cve/CVE-2015-8614