KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
History

Thu, 08 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-02-09T00:00:00.000Z

Updated: 2025-05-08T18:38:37.118Z

Reserved: 2024-02-02T00:00:00.000Z

Link: CVE-2024-25003

cve-icon Vulnrichment

Updated: 2024-08-01T23:36:21.358Z

cve-icon NVD

Status : Modified

Published: 2024-02-09T07:16:00.807

Modified: 2025-05-08T19:16:00.100

Link: CVE-2024-25003

cve-icon Redhat

No data.