
Cloud Vulnerability DB
A community-led vulnerabilities database
Multiple out-of-bounds write vulnerabilities exist in the LXT2 parsing functionality of GTKWave 3.3.115. The vulnerability (CVE-2023-39443) can lead to arbitrary code execution when a victim opens a specially-crafted .lxt2 file. This vulnerability specifically concerns the out-of-bounds write performed by the prefix copy loop (NVD, Talos).
The vulnerability exists in the LXT2 parsing functionality where an out-of-bounds write is performed by the prefix copy loop. The issue has a CVSS v3.1 Base Score of 7.8 HIGH (Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The vulnerability is triggered when processing LXT2 files through various functions in lxt2vcd.c, where the process_lxt() function performs unsafe operations that can lead to buffer overflows (Talos).
The successful exploitation of this vulnerability could lead to arbitrary code execution on the targeted system. The vulnerability affects the integrity of the system by allowing an attacker to execute malicious code with the privileges of the user running GTKWave (Talos).
The vulnerability has been fixed in GTKWave version 3.3.118. Users are advised to upgrade to this version or later to address this security issue. The fix has been included in various distribution updates, including Debian's security updates (Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."