CVE-2024-25003

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*

History

21 Nov 2024, 09:00

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html - () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html -
References () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List, Third Party Advisory
References () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - Exploit, Third Party Advisory () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - Exploit, Third Party Advisory

14 Feb 2024, 20:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html -

14 Feb 2024, 14:03

Type Values Removed Values Added
First Time 9bis
9bis kitty
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787
References () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - Third Party Advisory, VDB Entry
References () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - Exploit, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Feb/14 - () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Feb/13 - () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List, Third Party Advisory
CPE cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*

14 Feb 2024, 04:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Feb/14 -
  • () http://seclists.org/fulldisclosure/2024/Feb/13 -

09 Feb 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 07:16

Updated : 2024-11-21 09:00


NVD link : CVE-2024-25003

Mitre link : CVE-2024-25003

CVE.ORG link : CVE-2024-25003


JSON object : View

Products Affected

9bis

  • kitty
CWE
CWE-787

Out-of-bounds Write