A stack-based buffer overflow vulnerability in gross 0.9.3 through 1.x before 1.0.4 allows remote attackers to trigger a denial of service (grossd daemon crash) or potentially execute arbitrary code in grossd via crafted SMTP transaction parameters that cause an incorrect strncat for a log entry.
References
| Link | Resource |
|---|---|
| https://codeberg.org/bizdelnick/gross/wiki/Known-vulnerabilities#cve-2023-52159 | Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2024/03/msg00027.html | Mailing List |
| https://codeberg.org/bizdelnick/gross/wiki/Known-vulnerabilities#cve-2023-52159 | Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2024/03/msg00027.html | Mailing List |
Configurations
History
No history.
Information
Published : 2024-03-18 02:15
Updated : 2025-03-20 20:15
NVD link : CVE-2023-52159
Mitre link : CVE-2023-52159
CVE.ORG link : CVE-2023-52159
JSON object : View
Products Affected
bizdelnick
- gross
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write
