Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33147: CWE-121: Stack-based Buffer Overflow in GenericMappingTools gmt

0
High
VulnerabilityCVE-2026-33147cvecve-2026-33147cwe-121
Published: Fri Mar 20 2026 (03/20/2026, 20:10:28 UTC)
Source: CVE Database V5
Vendor/Project: GenericMappingTools
Product: gmt

Description

GMT is an open source collection of command-line tools for manipulating geographic and Cartesian data sets. In versions from 6.6.0 and prior, a stack-based buffer overflow vulnerability was identified in the gmt_remote_dataset_id function within src/gmt_remote.c. This issue occurs when a specially crafted long string is passed as a dataset identifier (e.g., via the which module), leading to a crash or potential arbitrary code execution. This issue has been patched via commit 0ad2b49.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 22:38:07 UTC

Technical Analysis

GenericMappingTools (GMT) is an open-source suite of command-line utilities used for processing geographic and Cartesian data sets. In versions 6.6.0 and earlier, a stack-based buffer overflow vulnerability (CWE-121) exists in the gmt_remote_dataset_id function located in src/gmt_remote.c. This vulnerability is triggered when a specially crafted, excessively long string is supplied as a dataset identifier, such as through the 'which' module. The overflow occurs on the stack, potentially overwriting control data, which can lead to a program crash or enable an attacker to execute arbitrary code with the privileges of the GMT process. The vulnerability does not require user interaction or prior authentication but does require local access to the system where GMT is installed. The CVSS 3.1 base score is 7.3, reflecting high severity due to the potential for code execution and denial of service. The issue was addressed and patched in a commit identified as 0ad2b49. No known exploits are currently reported in the wild, but the risk remains for unpatched systems. GMT is commonly used in scientific, governmental, and commercial environments for geospatial data analysis, making this vulnerability relevant to those sectors.

Potential Impact

The vulnerability can lead to a denial of service via application crashes or, more critically, arbitrary code execution, which compromises system integrity and confidentiality. Attackers exploiting this flaw could execute malicious code with the same privileges as the GMT process, potentially leading to further system compromise or lateral movement within a network. Organizations relying on GMT for geographic data processing, including research institutions, government agencies, and private sector companies in mapping, environmental monitoring, and defense, face risks of data corruption, service disruption, and unauthorized access. Since exploitation requires local access, insider threats or attackers who have gained initial footholds could leverage this vulnerability to escalate privileges or maintain persistence. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as proof-of-concept code could emerge post-disclosure.

Mitigation Recommendations

1. Immediately upgrade GMT installations to versions later than 6.6.0 where the vulnerability is patched. 2. Audit all systems to identify where GMT is installed and used, including automated scripts and pipelines that may invoke GMT commands. 3. Restrict local access to systems running GMT to trusted users only, minimizing the risk of exploitation by unauthorized personnel. 4. Employ application whitelisting and runtime protections such as stack canaries and address space layout randomization (ASLR) to reduce the risk of successful exploitation. 5. Monitor system logs and application behavior for unusual crashes or anomalies that could indicate attempted exploitation. 6. For environments where immediate patching is not feasible, consider isolating GMT usage in sandboxed or containerized environments to limit potential damage. 7. Educate system administrators and users about the risks and ensure secure handling of dataset identifiers to avoid passing untrusted input to GMT commands.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T21:17:08.884Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdacf5e32a4fbe5fcbbe12

Added to database: 3/20/2026, 8:24:21 PM

Last enriched: 3/27/2026, 10:38:07 PM

Last updated: 5/4/2026, 2:02:42 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses