KiTTY versions 0.76.1.13 and before is vulnerable to a...
High severity
Unreviewed
Published
Feb 9, 2024
to the GitHub Advisory Database
•
Updated Feb 23, 2024
Description
Published by the National Vulnerability Database
Feb 9, 2024
Published to the GitHub Advisory Database
Feb 9, 2024
Last updated
Feb 23, 2024
KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.
References