Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8ACE5337-4545-4F4C-8406-2E201A9FA660", "versionEndIncluding": "0.76.1.13", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution."}, {"lang": "es", "value": "Las versiones de KiTTY 0.76.1.13 y anteriores son vulnerables a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del nombre de usuario, que se produce debido a una verificaci\u00f3n de los l\u00edmites y una sanitizaci\u00f3n de entrada insuficientes (en la l\u00ednea 2600). Esto permite a un atacante sobrescribir la memoria adyacente, lo que conduce a la ejecuci\u00f3n de c\u00f3digo arbitrario."}], "id": "CVE-2024-25004", "lastModified": "2024-11-21T09:00:07.400", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2024-02-09T07:16:00.930", "references": [{"source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Mailing List"], "url": "http://seclists.org/fulldisclosure/2024/Feb/13"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Mailing List"], "url": "http://seclists.org/fulldisclosure/2024/Feb/14"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Mailing List"], "url": "http://seclists.org/fulldisclosure/2024/Feb/13"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Mailing List"], "url": "http://seclists.org/fulldisclosure/2024/Feb/14"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-787"}], "source": "nvd@nist.gov", "type": "Primary"}]}