Skip to main content

CVE-2023-35128: CWE-190: Integer Overflow or Wraparound in GTKWave GTKWave

High
VulnerabilityCVE-2023-35128cvecve-2023-35128cwe-190
Published: Mon Jan 08 2024 (01/08/2024, 14:47:56 UTC)
Source: CVE Database V5
Vendor/Project: GTKWave
Product: GTKWave

Description

An integer overflow vulnerability exists in the fstReaderIterBlocks2 time_table tsec_nitems functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 07/04/2025, 04:41:50 UTC

Technical Analysis

CVE-2023-35128 is a high-severity integer overflow vulnerability identified in GTKWave version 3.3.115, specifically within the fstReaderIterBlocks2 function related to the time_table tsec_nitems processing. GTKWave is a widely used open-source waveform viewer for digital design verification, commonly employed by hardware engineers to analyze simulation output files. The vulnerability arises when GTKWave processes a specially crafted .fst (Fast Signal Trace) file. Due to improper handling of integer values, an overflow or wraparound can occur, leading to memory corruption. This memory corruption could potentially be exploited to execute arbitrary code, cause a denial of service, or crash the application. Exploitation requires a victim to open a malicious .fst file, which means user interaction is necessary. The CVSS v3.1 base score is 7.0, indicating a high severity level, with the vector AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack vector is local (the attacker must have local access), the attack complexity is high, no privileges are required, but user interaction is necessary. The scope is unchanged, and the impact on confidentiality, integrity, and availability is high. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound), a common weakness that can lead to serious memory safety issues if not properly mitigated.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the use of GTKWave in their hardware design and verification workflows. Organizations involved in semiconductor design, embedded systems development, or academic research using GTKWave could face risks of application crashes, potential arbitrary code execution, or data corruption if malicious .fst files are opened. This could lead to loss of intellectual property, disruption of development processes, or compromise of systems if exploited in a targeted attack. Since the vulnerability requires opening a crafted file, the risk is primarily from insider threats or supply chain attacks where malicious files might be introduced. The high impact on confidentiality, integrity, and availability means sensitive design data could be exposed or altered, affecting product security and compliance with European data protection regulations. Additionally, disruption in development environments could delay product releases and increase costs. However, the local attack vector and high attack complexity reduce the likelihood of widespread exploitation, limiting the threat to environments where GTKWave is actively used and trusted files are handled.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict GTKWave usage to trusted personnel and environments to minimize exposure to malicious .fst files. 2) Implement strict file validation and scanning procedures for all .fst files before opening them in GTKWave, including sandboxing or opening files in isolated environments. 3) Monitor and control the distribution channels of .fst files, especially from external or third-party sources, to prevent supply chain insertion of malicious files. 4) Employ application whitelisting and endpoint protection solutions that can detect anomalous behavior or memory corruption attempts during GTKWave execution. 5) Maintain strict access controls on systems running GTKWave to prevent unauthorized local access, as exploitation requires local presence. 6) Stay alert for official patches or updates from GTKWave developers and apply them promptly once available. 7) Educate users about the risks of opening untrusted .fst files and enforce policies to avoid opening files from unknown sources. These measures go beyond generic advice by focusing on file handling policies, environment isolation, and access controls tailored to the specific attack vector and exploitation requirements of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2023-06-21T21:01:43.808Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff363

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/4/2025, 4:41:50 AM

Last updated: 8/17/2025, 1:29:02 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats