
Cloud Vulnerability DB
A community-led vulnerabilities database
Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. The vulnerability, identified as CVE-2023-37446, allows an attacker to potentially achieve arbitrary code execution through a specially crafted .vcd file. The vulnerability specifically concerns the out-of-bounds write when triggered via the vcd2lxt2 conversion utility. A victim would need to open a malicious file to trigger these vulnerabilities (Talos, NVD).
The vulnerability has been assigned a CVSS v3.1 Base Score of 7.8 (HIGH) with the vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The issue is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). The vulnerability affects the VCD parsing code in the vcd2lxt2 conversion utility, where it allows "$var" definitions to occur after "$enddefinitions", leading to potential out-of-bounds write operations (Talos).
The vulnerability can lead to arbitrary code execution on the targeted system if successfully exploited. This could potentially allow an attacker to execute malicious code with the privileges of the user running the GTKWave application (Talos).
The vulnerability has been fixed in GTKWave version 3.3.118. Users are advised to upgrade to this version or later to mitigate the vulnerability (Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."