CVE-2023-36916
📋 TL;DR
This CVE-2023-36916 vulnerability allows arbitrary code execution through integer overflow in GTKWave's FST file parser. Attackers can craft malicious .fst files that trigger memory corruption when opened by victims. Users of GTKWave who open untrusted waveform files are affected.
💻 Affected Systems
- GTKWave
📦 What is this software?
Gtkwave by Tonybybell
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the victim's machine through arbitrary code execution.
Likely Case
Local privilege escalation or malware installation when users open malicious waveform files from untrusted sources.
If Mitigated
Denial of service or application crash if memory protections prevent code execution.
🎯 Exploit Status
Exploitation requires user interaction to open malicious file, but the vulnerability is in core parsing functionality.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 3.3.115
Vendor Advisory: https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html
Restart Required: No
Instructions:
1. Check current GTKWave version. 2. Update to latest version from official repository. 3. Verify update by checking version number.
🔧 Temporary Workarounds
Restrict .fst file processing
allPrevent GTKWave from opening untrusted .fst files
chmod 644 *.fst
set file associations to open .fst with text editor only
🧯 If You Can't Patch
- Use application whitelisting to restrict GTKWave execution
- Implement user training to avoid opening untrusted waveform files
🔍 How to Verify
Check if Vulnerable:
Check GTKWave version: 'gtkwave --version' or check installed package version
Check Version:
gtkwave --version
Verify Fix Applied:
Confirm version is newer than 3.3.115 and test with known safe .fst files
📡 Detection & Monitoring
Log Indicators:
- Application crashes when opening .fst files
- Unusual memory allocation patterns
Network Indicators:
- File downloads of .fst files from untrusted sources
SIEM Query:
process_name:gtkwave AND (event_type:crash OR file_extension:fst)
🔗 References
- https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1798
- https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1798
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1798