CVE-2023-32650
NixOS vulnerability analysis and mitigation

Overview

An integer overflow vulnerability (CVE-2023-32650) was discovered in GTKWave version 3.3.115 when compiled as a 32-bit binary. The vulnerability specifically affects the FSTBLGEOM parsing maxhandle functionality. The issue was discovered by Claudio Bozzato of Cisco Talos and was publicly disclosed on January 8, 2024 (Talos Report).

Technical details

The vulnerability occurs in the FSTBLGEOM parsing maxhandle functionality where an integer overflow can occur during memory allocation. When processing a specially crafted .fst file, the multiplication of xc->maxhandle by 4 in 32-bit mode can wrap around, leading to a malloc(0) call or allocation of insufficient memory. This results in subsequent out-of-bounds writes on the heap. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 HIGH (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) by NIST NVD (NVD).

Impact

If successfully exploited, this vulnerability can lead to memory corruption when processing a malicious .fst file. Due to the multi-threaded nature of GTKWave, an attacker could potentially leverage this issue to execute arbitrary code. The vulnerability requires user interaction as the victim needs to open a malicious file to trigger the exploit (Talos Report).

Mitigation and workarounds

The vulnerability has been fixed in GTKWave version 3.3.118. Users are advised to upgrade to this or later versions. The fix has been incorporated into various distribution releases, including Debian 10 (buster) version 3.3.98+really3.3.118-0+deb10u1 (Debian LTS).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management