A stack-based buffer overflow vulnerability in gross 0.9.3 through 1.x before 1.0.4 allows remote attackers to trigger a denial of service (grossd daemon crash) or potentially execute arbitrary code in grossd via crafted SMTP transaction parameters that cause an incorrect strncat for a log entry.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gross | Ubuntu | devel | * |
Gross | Ubuntu | esm-apps/bionic | * |
Gross | Ubuntu | esm-apps/xenial | * |
Gross | Ubuntu | focal | * |
Gross | Ubuntu | jammy | * |
Gross | Ubuntu | mantic | * |
Gross | Ubuntu | noble | * |
Gross | Ubuntu | upstream | * |