KiTTY vulnerable to stack-based buffer overflow via username
CVE-2024-25004

7.8HIGH

Key Information:

Vendor

KiTTY

Status
Vendor
CVE Published:
9 February 2024

What is CVE-2024-25004?

KiTTY versions up to and including 0.76.1.13 exhibit a vulnerability where a stack-based buffer overflow can be triggered via unsafe input in the username field. This occurs due to a lack of adequate bounds checking and input sanitization at line 2600 of the code. When exploited, this vulnerability enables an attacker to overwrite adjacent memory, potentially allowing for arbitrary code execution. Users should upgrade to patched versions to mitigate the risk associated with this vulnerability.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.