CVE-2023-52159

A stack-based buffer overflow vulnerability in gross 0.9.3 through 1.x before 1.0.4 allows remote attackers to trigger a denial of service (grossd daemon crash) or potentially execute arbitrary code in grossd via crafted SMTP transaction parameters that cause an incorrect strncat for a log entry.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
VendorProductVersion
bizdelnickgross
0.9.3 ≤
𝑥
< 1.0.4
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gross
bullseye
1.0.2-4.1~deb11u1
fixed
bookworm
1.0.2-4.1~deb12u1
fixed
sid
1.0.2-4.1
fixed
trixie
1.0.2-4.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gross
noble
Fixed 1.0.2-4ubuntu0.24.04.1
released
mantic
ignored
jammy
Fixed 1.0.2-4ubuntu0.22.04.1
released
focal
Fixed 1.0.2-4ubuntu0.20.04.1
released
bionic
Fixed 1.0.2-4ubuntu0.18.04.1~esm1
released
xenial
Fixed 1.0.2-4ubuntu0.16.04.1~esm1
released