CVE-2024-25004
Published Feb 9, 2024
Last updated 9 months ago
Overview
- Description
- KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- CWE-787
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "8ACE5337-4545-4F4C-8406-2E201A9FA660", "versionEndIncluding": "0.76.1.13" } ], "operator": "OR" } ] } ]