Home

Description

Mintty is a terminal emulator for Cygwin, MSYS, and WSL. In versions 2.3.6 through 3.7.4, several escape sequences can cause the mintty process to access a file in a specific path. It is triggered by simply printing them out on bash. An attacker can specify an arbitrary network path, negotiate an ntlm hash out of the victim's machine to an attacker controlled remote host. An attacker can use password cracking tools or NetNTLMv2 hashes to Pass the Hash. Version 3.7.5 fixes the issue.

PUBLISHED Reserved 2024-08-26 | Published 2025-11-12 | Updated 2025-11-12 | Assigner GitHub_M




MEDIUM: 5.3CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-20: Improper Input Validation

Product status

>= 2.3.6, < 3.7.5
affected

References

github.com/...mintty/security/advisories/GHSA-jf4m-m6rv-p6c5

cve.org (CVE-2024-45301)

nvd.nist.gov (CVE-2024-45301)

Download JSON