CVE-2023-35997
📋 TL;DR
This vulnerability allows arbitrary code execution when a user opens a specially crafted .fst file in GTKWave. Attackers can exploit improper array index validation in the tdelta functionality to execute malicious code on the victim's system. Anyone using GTKWave to open untrusted waveform files is affected.
💻 Affected Systems
- GTKWave
📦 What is this software?
Gtkwave by Tonybybell
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the victim's machine through arbitrary code execution.
Likely Case
Local privilege escalation or malware installation when a user opens a malicious .fst file.
If Mitigated
No impact if users only open trusted .fst files or have patched versions.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file). No public exploit code found in references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Debian security updates or upstream GTKWave repository
Vendor Advisory: https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html
Restart Required: No
Instructions:
1. Update GTKWave through your package manager. 2. For Debian systems: apt-get update && apt-get upgrade gtkwave. 3. Verify installation of patched version.
🔧 Temporary Workarounds
Restrict .fst file handling
allConfigure system to only open .fst files from trusted sources
Sandbox GTKWave execution
linuxRun GTKWave in a restricted environment
firejail gtkwave
bwrap --dev-bind / / --tmpfs /tmp gtkwave
🧯 If You Can't Patch
- Only open .fst files from trusted, verified sources
- Use GTKWave in isolated virtual machines or containers
🔍 How to Verify
Check if Vulnerable:
Check GTKWave version: gtkwave --version
Check Version:
gtkwave --version
Verify Fix Applied:
Verify version is newer than 3.3.115 or check with package manager
📡 Detection & Monitoring
Log Indicators:
- GTKWave crashes with .fst files
- Unexpected process execution from GTKWave
Network Indicators:
- None - local file exploitation
SIEM Query:
Process:gtkwave AND (EventID:1000 OR EventID:1001) OR FileExtension:.fst
🔗 References
- https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791
- https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1791