First published: Mon Dec 21 2020(Updated: )
The Graphics Protocol feature in graphics.c in kitty before 0.19.3 allows remote attackers to execute arbitrary code because a filename containing special characters can be included in an error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/kitty | 0.13.3-1+deb10u1 0.19.3-1 0.26.5-5 | |
Kitty | <0.19.3 | |
Debian Linux | =10.0 | |
Kovidgoyal Kitty | <0.19.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35605 is considered to have a high severity due to the potential for remote code execution.
To fix CVE-2020-35605, upgrade to kitty version 0.19.3 or later.
CVE-2020-35605 affects kitty versions prior to 0.19.3, particularly in Debian distributions.
Yes, CVE-2020-35605 can be exploited remotely through specially crafted filenames in error messages.
The exploitation of CVE-2020-35605 can lead to arbitrary code execution, compromising the affected system.