// For flags

CVE-2024-25003

KiTTY 0.76.1.13 - 'Start Duplicated Session Hostname' Buffer Overflow

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

Las versiones de KiTTY 0.76.1.13 y anteriores son vulnerables a un desbordamiento de búfer en la región stack de la memoria a través del nombre de host, que se produce debido a una verificación de los límites y una sanitización de entrada insuficientes. Esto permite a un atacante sobrescribir la memoria adyacente, lo que conduce a la ejecución de código arbitrario.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2024-02-02 CVE Reserved
  • 2024-02-08 CVE Published
  • 2024-03-14 First Exploit
  • 2024-03-15 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
9bis
Search vendor "9bis"
Kitty
Search vendor "9bis" for product "Kitty"
<= 0.76.1.13
Search vendor "9bis" for product "Kitty" and version " <= 0.76.1.13"
windows
Affected