{"id":36337,"date":"2025-05-08T14:45:09","date_gmt":"2025-05-08T14:45:09","guid":{"rendered":""},"modified":"2025-07-05T23:19:29","modified_gmt":"2025-07-06T05:19:29","slug":"cve-2023-37442-severe-out-of-bounds-read-vulnerabilities-in-gtkwave-3-3-115","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2023-37442-severe-out-of-bounds-read-vulnerabilities-in-gtkwave-3-3-115\/","title":{"rendered":"<strong>CVE-2023-37442: Severe Out-of-Bounds Read Vulnerabilities in GTKWave 3.3.115<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The open-source waveform viewer, GTKWave 3.3.115, has been found to contain multiple severe out-of-bounds read vulnerabilities. These flaws, identified as CVE-2023-37442, can lead to arbitrary code execution, thus potentially compromising the system or leading to data leakage. The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-41646-critical-authentication-bypass-vulnerability-in-affected-software-packages\/\"  data-wpil-monitor-id=\"59322\">affected software<\/a> is widely used for viewing Verilog, VHDL, and other simulation output formats, making this a pressing concern for developers and organizations alike. Mitigation efforts are underway, and immediate action is advised.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2023-37442<br \/>\nSeverity: High (7.8 CVSS Score)<br \/>\nAttack Vector: Local<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: Required<br \/>\nImpact: System compromise and potential <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-50612-escalation-of-privileges-and-data-leakage-in-fit2cloud-cloud-explorer-lite\/\"  data-wpil-monitor-id=\"41263\">data leakage<\/a><\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3321066906\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>GTKWave | 3.3.115<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The vulnerabilities specifically exist in the VCD var definition section of <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-34436-critical-out-of-bounds-write-vulnerability-in-gtkwave-3-3-115\/\"  data-wpil-monitor-id=\"41035\">GTKWave<\/a>. When a specially crafted .vcd file is opened by a user, it triggers an out-of-bounds read, leading to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-21821-arbitrary-os-command-execution-vulnerability-in-multiple-tp-link-products\/\"  data-wpil-monitor-id=\"41106\">arbitrary code execution<\/a>. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2021-45465-critical-bmp-parsing-vulnerability-in-syngo-fastview\/\"  data-wpil-monitor-id=\"41247\">vulnerability is triggered via the GUI&#8217;s default VCD parsing<\/a> code. This means that an attacker can craft a malicious .vcd file that, when opened, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-20654-microsoft-odbc-driver-remote-code-execution-vulnerability-a-high-level-threat\/\"  data-wpil-monitor-id=\"41332\">executes the attacker&#8217;s arbitrary code<\/a> on the victim&#8217;s system.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3511824831\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>A conceptual example of this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-46275-unauthenticated-account-creation-vulnerability-in-wgs-80hpt-v2-and-wgs-4215-8t2s\/\"  data-wpil-monitor-id=\"41514\">vulnerability would involve the creation<\/a> of a malicious .vcd file. While the specifics of such a file are beyond the scope of this article, the pseudo-code below illustrates the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-2409-file-corruption-vulnerability-in-aspect-with-potential-for-system-compromise\/\"  data-wpil-monitor-id=\"53126\">potential structure of such a file:<\/a><\/p>\n<pre><code class=\"\" data-line=\"\">$scope module malicious $end\n$var wire 1 ! trigger $end\n$var wire 128 # payload $end\n$upscope $end\n$enddefinitions $end\n#0\n$dumpvars\n1!\nb{malicious_payload} #\n$end<\/code><\/pre>\n<p>In this pseudo-code, &#8216;`malicious_payload`&#8217; represents the arbitrary <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3641-remote-code-execution-risk-in-moodle-lms-dropbox-repository\/\"  data-wpil-monitor-id=\"41453\">code that the attacker wishes to execute<\/a> on the victim&#8217;s machine. The out-of-bounds read is triggered when GTKWave attempts to parse this malicious .vcd file, leading to the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3642-critical-remote-code-execution-vulnerability-in-moodle-lms-equella-repository\/\"  data-wpil-monitor-id=\"41520\">execution of the arbitrary code<\/a>.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>Users are advised to apply the vendor patch as soon as it becomes available. In the meantime, employing a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation against potential exploits. It&#8217;s recommended to refrain from <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2021-41691-sql-injection-vulnerability-in-os4ed-open-source-information-system-community\/\"  data-wpil-monitor-id=\"64190\">opening .vcd files from untrusted sources<\/a> until the patch is applied.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The open-source waveform viewer, GTKWave 3.3.115, has been found to contain multiple severe out-of-bounds read vulnerabilities. These flaws, identified as CVE-2023-37442, can lead to arbitrary code execution, thus potentially compromising the system or leading to data leakage. The affected software is widely used for viewing Verilog, VHDL, and other simulation output formats, making this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[80],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-36337","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-rce"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/36337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=36337"}],"version-history":[{"count":11,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/36337\/revisions"}],"predecessor-version":[{"id":57709,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/36337\/revisions\/57709"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=36337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=36337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=36337"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=36337"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=36337"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=36337"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=36337"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=36337"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=36337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}