UBUNTU-CVE-2015-8614

Source
https://ubuntu.com/security/CVE-2015-8614
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-8614.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2015-8614
Upstream
Published
2016-04-11T21:59:00Z
Modified
2025-07-18T16:43:19Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Multiple stack-based buffer overflows in the (1) convjistoeuc, (2) conveuctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail before 3.13.1 allow remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.

References

Affected packages

Ubuntu:Pro:16.04:LTS / macopix

Package

Name
macopix
Purl
pkg:deb/ubuntu/macopix@1.7.4-5?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.4-5