KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2024-02-09T00:00:00

Updated: 2024-02-14T20:05:57.559432

Reserved: 2024-02-02T00:00:00


Link: CVE-2024-25003

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2024-02-09T07:16:00.807

Modified: 2024-02-14T20:15:45.910


Link: CVE-2024-25003

JSON object: View

cve-icon Redhat Information

No data.

CWE