CVE-2024-25004
moderate-risk
Published 2024-02-09
KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
Do I need to act?
-
0.61% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (10)
Third Party Advisory
http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.htm...
Third Party Advisory
http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.htm...
31
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal