CVE-2024-25004

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*

History

14 Feb 2024, 20:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html -

14 Feb 2024, 14:02

Type Values Removed Values Added
CPE cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*
First Time 9bis
9bis kitty
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References
  • () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List
  • () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List
References () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - Third Party Advisory, VDB Entry
References () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - Exploit, Third Party Advisory
CWE CWE-787

09 Feb 2024, 14:31

Type Values Removed Values Added
Summary
  • (es) Las versiones de KiTTY 0.76.1.13 y anteriores son vulnerables a un desbordamiento de búfer en la región stack de la memoria a través del nombre de usuario, que se produce debido a una verificación de los límites y una sanitización de entrada insuficientes (en la línea 2600). Esto permite a un atacante sobrescribir la memoria adyacente, lo que conduce a la ejecución de código arbitrario.

09 Feb 2024, 08:15

Type Values Removed Values Added
Summary (en) KiTTY versions 0.76.1.13 and before has a stack-based buffer overflow where the username is vulnerable to a stack-based buffer overflow, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution. (en) KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

09 Feb 2024, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 07:16

Updated : 2024-02-14 20:15


NVD link : CVE-2024-25004

Mitre link : CVE-2024-25004

CVE.ORG link : CVE-2024-25004


JSON object : View

Products Affected

9bis

  • kitty
CWE
CWE-787

Out-of-bounds Write