Stack-based Buffer Overflow Affecting cyd01/KiTTY package, versions [0,]


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Mature
EPSS
0.05% (23rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-CYD01KITTY-6240889
  • published9 Feb 2024
  • disclosed9 Feb 2024
  • creditAustin A. DeFrancesco

Introduced: 9 Feb 2024

CVE-2024-25003  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

There is no fixed version for cyd01/KiTTY.

Overview

Affected versions of this package are vulnerable to Stack-based Buffer Overflow via the hostname argument, due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution by crafting a malicious hostname.

PoC

(47c.23ac): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=00000001 ebx=41414141 ecx=861615a9 edx=01130000 esi=41414141 edi=41414141
eip=41414141 esp=0084e790 ebp=41414141 iopl=0         nv up ei pl nz na po nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
41414141 ??              ???

CVSS Scores

version 3.1