KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-22365 | KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 08 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-08T18:38:37.118Z
Reserved: 2024-02-02T00:00:00.000Z
Link: CVE-2024-25003
Updated: 2024-08-01T23:36:21.358Z
Status : Modified
Published: 2024-02-09T07:16:00.807
Modified: 2025-05-08T19:16:00.100
Link: CVE-2024-25003
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD