CVE-2024-25004

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*

History

14 Feb 2024, 20:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html -

14 Feb 2024, 14:02

Type Values Removed Values Added
First Time 9bis
9bis kitty
CPE cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - () http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html - Third Party Advisory, VDB Entry
References () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - () https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004 - Exploit, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Feb/14 - () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List
References () http://seclists.org/fulldisclosure/2024/Feb/13 - () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List

14 Feb 2024, 04:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Feb/14 -
  • () http://seclists.org/fulldisclosure/2024/Feb/13 -

09 Feb 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 07:16

Updated : 2024-02-28 20:54


NVD link : CVE-2024-25004

Mitre link : CVE-2024-25004

CVE.ORG link : CVE-2024-25004


JSON object : View

Products Affected

9bis

  • kitty
CWE
CWE-787

Out-of-bounds Write