Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-37442

Опубликовано: 08 янв. 2024
Источник: debian
EPSS Низкий

Описание

Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds read when triggered via the GUI's default VCD parsing code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gtkwavefixed3.3.118-0.1package

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805

EPSS

Процентиль: 25%
0.00085
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 2 лет назад

Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds read when triggered via the GUI's default VCD parsing code.

CVSS3: 7.8
nvd
около 2 лет назад

Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds read when triggered via the GUI's default VCD parsing code.

CVSS3: 7.8
github
около 2 лет назад

Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds read when triggered via the GUI's default VCD parsing code.

EPSS

Процентиль: 25%
0.00085
Низкий