{"id":"CVE-2024-25003","details":"KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.","modified":"2026-03-20T04:19:07.270301Z","published":"2024-02-09T07:16:00.807Z","references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html"},{"type":"EVIDENCE","url":"https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2024/Feb/13"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2024/Feb/14"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cyd01/kitty","events":[{"introduced":"0"},{"last_affected":"75fa2abcd220c17249ff7252f8d5224137001f2d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.76.1.13"}]}}],"versions":["0.70.0.9","0.71.0.1","0.71.0.2","0.71.0.3","0.71.0.4","0.71.0.5","0.71.0.6","0.71.0.7","0.72.0.1","0.72.0.2","0.72.0.3","0.72.0.4","0.72.0.5","0.72.0.6","0.73.0.1","0.73.0.2","0.73.1.1","0.73.1.2","0.73.1.3","0.73.1.4","0.73.1.5","0.73.2.1","0.73.2.10","0.73.2.11","0.73.2.12","0.73.2.13","0.73.2.14","0.73.2.15","0.73.2.16","0.73.2.17","0.73.2.18","0.73.2.2","0.73.2.3","0.73.2.4","0.73.2.5","0.73.2.6","0.73.2.7","0.73.2.8","0.73.2.9","0.74.0.1","0.74.0.2","0.74.0.3","0.74.0.4","0.74.0.5","0.74.0.6","0.74.0.7","0.74.1.1","0.74.2.1","0.74.2.2","0.74.2.3","0.74.2.4","0.74.2.5","0.74.2.6","0.74.2.7","0.74.2.8","0.74.3.1","0.74.3.2","0.74.3.3","0.74.3.4","0.74.3.5","0.74.4.1","0.74.4.10","0.74.4.11","0.74.4.12","0.74.4.13","0.74.4.2","0.74.4.3","0.74.4.4","0.74.4.5","0.74.4.6","0.74.4.7","0.74.4.8","0.74.4.9","0.76.0.1","0.76.0.10","0.76.0.11","0.76.0.12","0.76.0.13","0.76.0.14","0.76.0.2","0.76.0.3","0.76.0.4","0.76.0.5","0.76.0.6","0.76.0.7","0.76.0.8","0.76.0.9","0.76.1.10","0.76.1.13","0.76.1.2","0.76.1.3","0.76.1.4","0.76.1.5","0.76.1.6","0.76.1.7","0.76.1.8","0.76.1.9","v0.74.0.7","v0.74.2.8","v0.74.3.1","v0.74.3.2","v0.74.3.3","v0.74.3.4","v0.74.3.5","v0.74.4.1","v0.74.4.10","v0.74.4.11","v0.74.4.12","v0.74.4.13","v0.74.4.2","v0.74.4.3","v0.74.4.4","v0.74.4.5","v0.74.4.6","v0.74.4.7","v0.74.4.8","v0.74.4.9","v0.76.0.1","v0.76.0.10","v0.76.0.11","v0.76.0.12","v0.76.0.13","v0.76.0.14","v0.76.0.2","v0.76.0.3","v0.76.0.5","v0.76.0.6","v0.76.0.7","v0.76.0.8","v0.76.0.9","v0.76.1.10","v0.76.1.13","v0.76.1.2","v0.76.1.3","v0.76.1.4","v0.76.1.5","v0.76.1.6","v0.76.1.7","v0.76.1.8","v0.76.1.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-25003.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}