[arch-security] [ASA-201512-13] claws-mail: buffer overflow
rgacogne at archlinux.org
Tue Dec 22 21:10:28 UTC 2015
Arch Linux Security Advisory ASA-201512-13
Date : 2015-12-22
CVE-ID : CVE-2015-8614
Package : claws-mail
Type : buffer overflow
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package claws-mail before version 3.13.1-1 is vulnerable to a
remotely triggerable buffer overflow.
Upgrade to 3.13.1-1.
# pacman -Syu "claws-mail>=3.13.1-1"
The problem has been fixed upstream in version 3.13.1.
A remotely triggerable buffer overflow has been found in the code of
claws-mail handling character conversion, in functions conv_jistoeuc(),
conv_euctojis() and conv_sjistoeuc(), in codeconv.c.
There was no bounds checking on buffers passed to these functions, some
stack-based but other potentially heap-based.
This issue has been located in the wild and might currently be exploited.
A remote attacker might be able to execute arbitrary code on the
affected host by sending a crafted e-mail to a clasw-mail user.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 801 bytes
Desc: OpenPGP digital signature
More information about the arch-security