CVE-2024-25003

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*

History

14 Feb 2024, 20:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html -

14 Feb 2024, 14:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787
First Time 9bis
9bis kitty
CPE cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*
References
  • () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List, Third Party Advisory
  • () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - Third Party Advisory, VDB Entry
References () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - Exploit, Third Party Advisory

09 Feb 2024, 14:31

Type Values Removed Values Added
Summary
  • (es) Las versiones de KiTTY 0.76.1.13 y anteriores son vulnerables a un desbordamiento de búfer en la región stack de la memoria a través del nombre de host, que se produce debido a una verificación de los límites y una sanitización de entrada insuficientes. Esto permite a un atacante sobrescribir la memoria adyacente, lo que conduce a la ejecución de código arbitrario.

09 Feb 2024, 08:15

Type Values Removed Values Added
Summary (en) KiTTY versions 0.76.1.13 and before has a stack-based buffer overflow where the hostname is vulnerable to a stack-based buffer overflow, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution. (en) KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

09 Feb 2024, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 07:16

Updated : 2024-02-14 20:15


NVD link : CVE-2024-25003

Mitre link : CVE-2024-25003

CVE.ORG link : CVE-2024-25003


JSON object : View

Products Affected

9bis

  • kitty
CWE
CWE-787

Out-of-bounds Write