First published: Fri Feb 09 2024(Updated: )
KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
Credit: cve@mitre.org DEFCESCO
Affected Software | Affected Version | How to fix |
---|---|---|
9bis KiTTY | <=0.76.1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25004 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2024-25004, users should update to KiTTY version 0.76.1.14 or later, which addresses the vulnerability.
CVE-2024-25004 exploits a stack-based buffer overflow caused by insufficient bounds checking in the username input.
KiTTY versions 0.76.1.13 and earlier are affected by CVE-2024-25004.
An attacker can exploit CVE-2024-25004 by sending specially crafted input that causes a buffer overflow, potentially allowing code execution.