CVE-2024-25003

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*

History

14 Feb 2024, 20:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html -

14 Feb 2024, 14:03

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*
First Time 9bis
9bis kitty
References () http://seclists.org/fulldisclosure/2024/Feb/14 - () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2024/Feb/13 - () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List, Third Party Advisory
References () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

14 Feb 2024, 04:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Feb/13 -
  • () http://seclists.org/fulldisclosure/2024/Feb/14 -

09 Feb 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 07:16

Updated : 2025-05-08 19:16


NVD link : CVE-2024-25003

Mitre link : CVE-2024-25003


JSON object : View

Products Affected

9bis

  • kitty
CWE
CWE-787

Out-of-bounds Write