{"id":34700,"date":"2025-05-05T16:13:46","date_gmt":"2025-05-05T16:13:46","guid":{"rendered":""},"modified":"2025-10-29T04:22:09","modified_gmt":"2025-10-29T10:22:09","slug":"cve-2023-35955-heap-based-buffer-overflow-vulnerabilities-in-gtkwave","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2023-35955-heap-based-buffer-overflow-vulnerabilities-in-gtkwave\/","title":{"rendered":"<strong>CVE-2023-35955: Heap-Based Buffer Overflow Vulnerabilities in GTKWave<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>In this blog post, we will delve into the details of a serious cybersecurity vulnerability, CVE-2023-35955, that affects the GTKWave 3.3.115. This vulnerability is particularly significant due to its potential to lead to arbitrary code execution, resulting in potential system compromise or data leakage. The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-52928-severe-bypass-issue-in-arc-on-windows-allows-unauthorized-permissions-grant\/\"  data-wpil-monitor-id=\"65120\">severity of the issue<\/a> is further underscored by its CVSS Severity Score of 7.8. The vulnerability specifically originates from multiple heap-based <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-28024-buffer-overflow-vulnerability-in-totolink-a810r-v4-1-2cu-5182-b20201026\/\"  data-wpil-monitor-id=\"39564\">buffer overflow<\/a> vulnerabilities in the fstReaderIterBlocks2 VCDATA parsing functionality of the software.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2023-35955<br \/>\nSeverity: High (7.8\/10)<br \/>\nAttack Vector: File-based (<a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32701-elevation-of-privileges-via-windows-common-log-file-system-driver\/\"  data-wpil-monitor-id=\"91781\">via a specially-crafted .fst file)<\/a><br \/>\nPrivileges Required: None<br \/>\nUser Interaction: Required (victim needs to open a malicious file)<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-22636-cross-site-scripting-vulnerability-in-vr-frases-leads-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"40177\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-323279788\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>GTKWave | 3.3.115<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit takes advantage of multiple heap-based buffer <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-45429-stack-overflow-vulnerability-in-tenda-ac9-v1-0-router\/\"  data-wpil-monitor-id=\"40031\">overflow vulnerabilities<\/a> in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave. Specifically, the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-35960-os-command-injection-vulnerabilities-in-gtkwave-s-decompression-functionality\/\"  data-wpil-monitor-id=\"41729\">decompression function `LZ4_decompress_safe_partial` is implicated in this vulnerability<\/a>.<br \/>\nAn attacker prepares a specially-crafted .fst <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-43958-arbitrary-file-upload-vulnerability-in-hospital-management-system-v4-0\/\"  data-wpil-monitor-id=\"39694\">file that is designed to trigger these vulnerabilities<\/a> when opened. The file can be disseminated to victims through various methods, such as phishing emails or malicious downloads. Once the victim opens the malicious file, the attacker can achieve arbitrary code execution, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32857-sql-injection-vulnerability-in-telecontrol-server-basic-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"39752\">potentially leading to system<\/a> compromise or data leakage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2179021888\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>While we won&#8217;t provide an actual exploit code for ethical reasons, we can conceptualize the exploitation process.<br \/>\nFirst, an attacker would need to craft a malicious .fst <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3616-arbitrary-file-upload-vulnerability-in-greenshift-wordpress-plugin\/\"  data-wpil-monitor-id=\"39917\">file that could exploit the buffer overflow vulnerabilities<\/a>. The payload of this file might look something like this:<\/p>\n<pre><code class=\"\" data-line=\"\">$ echo -e &quot;VCD2\\n\\$end\\n\\$timescale 1 ns\\n\\$end\\n\\$scope module top\\n\\$end\\n\\$var wire 1 ! clk\\n\\$end\\n#0\\n1!\\n#1\\n0!\\n#2\\n1!\\n#2.5\\n\\$dumpvars\\n0!\\n\\$end\\n#3\\n1!\\n#4\\n&quot; &gt; malicious.fst<\/code><\/pre>\n<p>The attacker then disseminates this file to the victim, who, upon opening it with GTKWave, triggers the buffer overflow and subsequent <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-40446-arbitrary-code-execution-vulnerability-in-forkosh-mime-tex\/\"  data-wpil-monitor-id=\"39852\">arbitrary code execution<\/a>.<\/p>\n<p><strong>Mitigation<\/strong><\/p>\n<p>As a mitigation measure, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-2594-critical-vulnerability-in-user-registration-membership-wordpress-plugin\/\"  data-wpil-monitor-id=\"40478\">users can apply the vendor-provided patch to fix this vulnerability<\/a>. Alternatively, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5485-a-critical-vulnerability-pertaining-to-user-name-enumeration-in-web-management-interfaces\/\"  data-wpil-monitor-id=\"65121\">users can deploy Web<\/a> Application Firewalls (WAF) or Intrusion Detection Systems (IDS) as a temporary mitigation method until the patch can be applied. Regularly <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-2817-system-level-updater-vulnerability-in-thunderbird-s-update-mechanism\/\"  data-wpil-monitor-id=\"41082\">updating software and keeping abreast of newly discovered vulnerabilities<\/a> can help prevent such attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview In this blog post, we will delve into the details of a serious cybersecurity vulnerability, CVE-2023-35955, that affects the GTKWave 3.3.115. This vulnerability is particularly significant due to its potential to lead to arbitrary code execution, resulting in potential system compromise or data leakage. The severity of the issue is further underscored by its [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[86,80],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-34700","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-buffer-overflow","attack_vector-rce"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/34700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=34700"}],"version-history":[{"count":12,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/34700\/revisions"}],"predecessor-version":[{"id":84954,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/34700\/revisions\/84954"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=34700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=34700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=34700"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=34700"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=34700"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=34700"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=34700"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=34700"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=34700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}