
Cloud Vulnerability DB
A community-led vulnerabilities database
Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. The vulnerability (CVE-2023-38621) specifically concerns the integer overflow when allocating the flags array. A specially crafted .vzt file can lead to arbitrary code execution, requiring a victim to open a malicious file to trigger these vulnerabilities (Talos).
The vulnerability occurs in the VZT facgeometry parsing functionality where the size of the flags array is calculated by multiplying numfacs by 4. When numfacs is larger than 0x40000000, this multiplication wraps around in 32-bit mode, resulting in a malloc call with a smaller size than intended. This is followed by a loop over numfacs which writes to the allocated buffers, leading to out-of-bounds writes on the heap. The vulnerability has a CVSS v3.1 Base Score of 7.8 HIGH (Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) (Talos, NVD).
The vulnerability can lead to arbitrary code execution. By carefully manipulating heap allocations, the out-of-bounds writes can be used to overwrite pointers inside the structure, which can then be used to write to arbitrary locations in memory (Talos).
The vulnerability has been fixed in GTKWave version 3.3.118. Users are recommended to upgrade to this or a later version (Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."