A stack-based buffer overflow vulnerability in gross 0.9.3 through 1.x before 1.0.4 allows remote attackers to trigger a denial of service (grossd daemon crash) or potentially execute arbitrary code in grossd via crafted SMTP transaction parameters that cause an incorrect strncat for a log entry.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://codeberg.org/bizdelnick/gross/wiki/Known-vulnerabilities#cve-2023-52159 | third party advisory |
https://lists.debian.org/debian-lts-announce/2024/03/msg00027.html | mailing list |