CVE-2023-35128: CWE-190: Integer Overflow or Wraparound in GTKWave GTKWave
An integer overflow vulnerability exists in the fstReaderIterBlocks2 time_table tsec_nitems functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2023-35128 is a high-severity integer overflow vulnerability identified in GTKWave version 3.3.115, specifically within the fstReaderIterBlocks2 function related to the time_table tsec_nitems processing. GTKWave is a widely used open-source waveform viewer for digital design verification, commonly employed by hardware engineers to analyze simulation output files. The vulnerability arises when GTKWave processes a specially crafted .fst (Fast Signal Trace) file. Due to improper handling of integer values, an overflow or wraparound can occur, leading to memory corruption. This memory corruption could potentially be exploited to execute arbitrary code, cause a denial of service, or crash the application. Exploitation requires a victim to open a malicious .fst file, which means user interaction is necessary. The CVSS v3.1 base score is 7.0, indicating a high severity level, with the vector AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack vector is local (the attacker must have local access), the attack complexity is high, no privileges are required, but user interaction is necessary. The scope is unchanged, and the impact on confidentiality, integrity, and availability is high. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound), a common weakness that can lead to serious memory safety issues if not properly mitigated.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the use of GTKWave in their hardware design and verification workflows. Organizations involved in semiconductor design, embedded systems development, or academic research using GTKWave could face risks of application crashes, potential arbitrary code execution, or data corruption if malicious .fst files are opened. This could lead to loss of intellectual property, disruption of development processes, or compromise of systems if exploited in a targeted attack. Since the vulnerability requires opening a crafted file, the risk is primarily from insider threats or supply chain attacks where malicious files might be introduced. The high impact on confidentiality, integrity, and availability means sensitive design data could be exposed or altered, affecting product security and compliance with European data protection regulations. Additionally, disruption in development environments could delay product releases and increase costs. However, the local attack vector and high attack complexity reduce the likelihood of widespread exploitation, limiting the threat to environments where GTKWave is actively used and trusted files are handled.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict GTKWave usage to trusted personnel and environments to minimize exposure to malicious .fst files. 2) Implement strict file validation and scanning procedures for all .fst files before opening them in GTKWave, including sandboxing or opening files in isolated environments. 3) Monitor and control the distribution channels of .fst files, especially from external or third-party sources, to prevent supply chain insertion of malicious files. 4) Employ application whitelisting and endpoint protection solutions that can detect anomalous behavior or memory corruption attempts during GTKWave execution. 5) Maintain strict access controls on systems running GTKWave to prevent unauthorized local access, as exploitation requires local presence. 6) Stay alert for official patches or updates from GTKWave developers and apply them promptly once available. 7) Educate users about the risks of opening untrusted .fst files and enforce policies to avoid opening files from unknown sources. These measures go beyond generic advice by focusing on file handling policies, environment isolation, and access controls tailored to the specific attack vector and exploitation requirements of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland
CVE-2023-35128: CWE-190: Integer Overflow or Wraparound in GTKWave GTKWave
Description
An integer overflow vulnerability exists in the fstReaderIterBlocks2 time_table tsec_nitems functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2023-35128 is a high-severity integer overflow vulnerability identified in GTKWave version 3.3.115, specifically within the fstReaderIterBlocks2 function related to the time_table tsec_nitems processing. GTKWave is a widely used open-source waveform viewer for digital design verification, commonly employed by hardware engineers to analyze simulation output files. The vulnerability arises when GTKWave processes a specially crafted .fst (Fast Signal Trace) file. Due to improper handling of integer values, an overflow or wraparound can occur, leading to memory corruption. This memory corruption could potentially be exploited to execute arbitrary code, cause a denial of service, or crash the application. Exploitation requires a victim to open a malicious .fst file, which means user interaction is necessary. The CVSS v3.1 base score is 7.0, indicating a high severity level, with the vector AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack vector is local (the attacker must have local access), the attack complexity is high, no privileges are required, but user interaction is necessary. The scope is unchanged, and the impact on confidentiality, integrity, and availability is high. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound), a common weakness that can lead to serious memory safety issues if not properly mitigated.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the use of GTKWave in their hardware design and verification workflows. Organizations involved in semiconductor design, embedded systems development, or academic research using GTKWave could face risks of application crashes, potential arbitrary code execution, or data corruption if malicious .fst files are opened. This could lead to loss of intellectual property, disruption of development processes, or compromise of systems if exploited in a targeted attack. Since the vulnerability requires opening a crafted file, the risk is primarily from insider threats or supply chain attacks where malicious files might be introduced. The high impact on confidentiality, integrity, and availability means sensitive design data could be exposed or altered, affecting product security and compliance with European data protection regulations. Additionally, disruption in development environments could delay product releases and increase costs. However, the local attack vector and high attack complexity reduce the likelihood of widespread exploitation, limiting the threat to environments where GTKWave is actively used and trusted files are handled.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict GTKWave usage to trusted personnel and environments to minimize exposure to malicious .fst files. 2) Implement strict file validation and scanning procedures for all .fst files before opening them in GTKWave, including sandboxing or opening files in isolated environments. 3) Monitor and control the distribution channels of .fst files, especially from external or third-party sources, to prevent supply chain insertion of malicious files. 4) Employ application whitelisting and endpoint protection solutions that can detect anomalous behavior or memory corruption attempts during GTKWave execution. 5) Maintain strict access controls on systems running GTKWave to prevent unauthorized local access, as exploitation requires local presence. 6) Stay alert for official patches or updates from GTKWave developers and apply them promptly once available. 7) Educate users about the risks of opening untrusted .fst files and enforce policies to avoid opening files from unknown sources. These measures go beyond generic advice by focusing on file handling policies, environment isolation, and access controls tailored to the specific attack vector and exploitation requirements of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- talos
- Date Reserved
- 2023-06-21T21:01:43.808Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc1182aa0cae27ff363
Added to database: 6/3/2025, 2:59:13 PM
Last enriched: 7/4/2025, 4:41:50 AM
Last updated: 8/17/2025, 1:29:02 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.