
CVE-2024-25003 – KiTTY 0.76.1.13 - 'Start Duplicated Session Hostname' Buffer Overflow
https://notcve.org/view.php?id=CVE-2024-25003
08 Feb 2024 — KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution. Las versiones de KiTTY 0.76.1.13 y anteriores son vulnerables a un desbordamiento de búfer en la región stack de la memoria a través del nombre de host, que se produce debido a una verificación de los límites y una sanitización de entrada insuficien... • https://packetstorm.news/files/id/177031 • CWE-787: Out-of-bounds Write •

CVE-2024-25004 – KiTTY 0.76.1.13 - 'Start Duplicated Session Username' Buffer Overflow
https://notcve.org/view.php?id=CVE-2024-25004
08 Feb 2024 — KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution. Las versiones de KiTTY 0.76.1.13 y anteriores son vulnerables a un desbordamiento de búfer en la región stack de la memoria a través del nombre de usuario, que se produce debido a una verificación de los límites y una sanitización de ... • https://packetstorm.news/files/id/177031 • CWE-787: Out-of-bounds Write •

CVE-2024-23749 – KiTTY 0.76.1.13 - Command Injection
https://notcve.org/view.php?id=CVE-2024-23749
08 Feb 2024 — KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution. Las versiones de KiTTY 0.76.1.13 y anteriores son vulnerables a la inyección de comandos a través de la variable de nombre de archivo, se produce debido a una sa... • https://packetstorm.news/files/id/177031 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2023-48795 – ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
https://notcve.org/view.php?id=CVE-2023-48795
18 Dec 2023 — The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phas... • https://packetstorm.news/files/id/176280 • CWE-222: Truncation of Security-relevant Information CWE-354: Improper Validation of Integrity Check Value •

CVE-2022-41322 – Ubuntu Security Notice USN-5659-1
https://notcve.org/view.php?id=CVE-2022-41322
23 Sep 2022 — In Kitty before 0.26.2, insufficient validation in the desktop notification escape sequence can lead to arbitrary code execution. The user must display attacker-controlled content in the terminal, then click on a notification popup. En Kitty versiones anteriores a 0.26.2, una comprobación insuficiente en la secuencia de escape de la notificación de escritorio puede conllevar a una ejecución de código arbitrario. El usuario debe mostrar contenido controlado por el atacante en el terminal y luego hacer clic e... • https://bugs.gentoo.org/868543 • CWE-116: Improper Encoding or Escaping of Output •

CVE-2020-35605 – Debian Security Advisory 4819-1
https://notcve.org/view.php?id=CVE-2020-35605
21 Dec 2020 — The Graphics Protocol feature in graphics.c in kitty before 0.19.3 allows remote attackers to execute arbitrary code because a filename containing special characters can be included in an error message. La funcionalidad Graphics Protocol en el archivo graphics.c en kitty versiones anteriores a 0.19.3, permite a atacantes remotos ejecutar código arbitrario porque un nombre de archivo que contiene caracteres especiales puede ser incluido en un mensaje de error Stephane Chauveau discovered that kitty incorrect... • https://github.com/kovidgoyal/kitty/commit/82c137878c2b99100a3cdc1c0f0efea069313901 •

CVE-2016-2563 – Putty pscp 0.66 - Stack Buffer Overwrite
https://notcve.org/view.php?id=CVE-2016-2563
11 Mar 2016 — Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request. Desbordamiento de buffer basado en pila en la utilidad comando-línea de SCP en PuTTY en versiones anteriores a 0.67 y KiTTY 0.66.6.3 y versiones anteriores permite a servidores remotos causar una denegación de servicio (corrupc... • https://packetstorm.news/files/id/136166 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •