SB2024010836 - Multiple vulnerabilities in GTKWave



SB2024010836 - Multiple vulnerabilities in GTKWave

Published: January 8, 2024 Updated: January 9, 2024

Security Bulletin ID SB2024010836
Severity
High
Patch available
YES
Number of vulnerabilities 82
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 94% Medium 5% Low 1%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 82 secuirty vulnerabilities.


1) Out-of-bounds write (CVE-ID: CVE-2023-37445)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary condition in the vcd2vzt conversion utility. A remote attacker can pass a specially crafted .vcd file to the application, trigger an out-of-bounds write and execute arbitrary code on the target system.


2) Out-of-bounds read (CVE-ID: CVE-2023-37442)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the VCD GUI recoder. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


3) Out-of-bounds read (CVE-ID: CVE-2023-37444)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in VCD GUI interactive. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


4) Out-of-bounds read (CVE-ID: CVE-2023-37443)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in VCD GUI legacy. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


5) Out-of-bounds read (CVE-ID: CVE-2023-37447)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the vcd2lxt conversion utility. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


6) Out-of-bounds read (CVE-ID: CVE-2023-37446)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition n the vcd2lxt2 conversion utility. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


7) Integer underflow (CVE-ID: CVE-2023-39413)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer underflow in the LXT2 lxt2_rd_iter_radix shift operation functionality. A remote attacker can trick the victim to open a specially crafted .lxt2 file, trigger an integer underflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


8) Improper Validation of Array Index (CVE-ID: CVE-2023-35994)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 tdelta functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger an array index error and execute arbitrary code on the system.


9) Improper Validation of Array Index (CVE-ID: CVE-2023-35996)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 tdelta functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger an array index error and execute arbitrary code on the system.


10) Improper Validation of Array Index (CVE-ID: CVE-2023-35995)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 tdelta functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger an array index error and execute arbitrary code on the system.


11) Improper Validation of Array Index (CVE-ID: CVE-2023-35997)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 tdelta functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger an array index error and execute arbitrary code on the system.


12) Integer overflow (CVE-ID: CVE-2023-35057)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the LXT2 lxt2_rd_trace value elements allocation functionality. A remote attacker can trick the victim to open a specially crafted .lxt2 file, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


13) Out-of-bounds write (CVE-ID: CVE-2023-38657)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the LXT2 zlib block decompression functionality. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


14) Out-of-bounds write (CVE-ID: CVE-2023-39443)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in string copy loop during LXT2 lxt2_rd_get_facname decompression. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


15) Out-of-bounds write (CVE-ID: CVE-2023-39444)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in prefix copy loop during LXT2 lxt2_rd_get_facname decompression. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


16) Stack-based buffer overflow (CVE-ID: CVE-2023-38583)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the LXT2 lxt2_rd_expand_integer_to_bits function. A remote unauthenticated attacker can trick the victim to open a specially crafted .lxt2 file, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


17) Out-of-bounds write (CVE-ID: CVE-2023-34436)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the LXT2 num_time_table_entries functionality. A remote attacker can create a specially crafted .lxt2 file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


18) Improper Validation of Array Index (CVE-ID: CVE-2023-39235)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary error in the VZT vzt_rd_process_block autosort functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an array index error and execute arbitrary code on the system.

19) Integer underflow (CVE-ID: CVE-2023-39414)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer underflow in the LXT2 lxt2_rd_iter_radix shift operation functionality. A remote attacker can trick the victim to open a specially crafted .lxt2 file, trigger an integer underflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


20) Improper Validation of Array Index (CVE-ID: CVE-2023-39234)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary error in the VZT vzt_rd_process_block autosort functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an array index error and execute arbitrary code on the system.

21) Integer overflow (CVE-ID: CVE-2023-35989)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the LXT2 zlib block allocation functionality. A remote attacker can trick the victim to open a specially crafted .lxt2 file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


22) Integer overflow (CVE-ID: CVE-2023-36864)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the fstReaderIterBlocks2 temp_signal_value_buf allocation functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


23) Integer overflow (CVE-ID: CVE-2023-38619)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the VZT facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


24) Integer overflow (CVE-ID: CVE-2023-38620)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the VZT facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


25) Integer overflow (CVE-ID: CVE-2023-38618)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the VZT facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


26) Integer overflow (CVE-ID: CVE-2023-38621)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the VZT facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


27) Integer overflow (CVE-ID: CVE-2023-38622)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the VZT facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


28) Buffer overflow (CVE-ID: CVE-2023-37921)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the VCD sorted bsearch functionality. A remote attacker can create a specially crafted .vcd file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


29) Integer overflow (CVE-ID: CVE-2023-38623)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the VZT facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


30) Integer overflow (CVE-ID: CVE-2023-35128)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the fstReaderIterBlocks2 time_table tsec_nitems functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


31) Improper Validation of Array Index (CVE-ID: CVE-2023-34087)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the EVCD var len parsing functionality. A remote attacker can create a specially crafted .evcd file, trick the victim into opening it using the affected software, trigger an array index error and execute arbitrary code on the system.


32) OS Command Injection (CVE-ID: CVE-2023-35963)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the decompression functionality. A remote attacker can trick the victim to open a specially crafted wave file and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


33) Heap-based buffer overflow (CVE-ID: CVE-2023-35969)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 chain_table parsing functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


34) OS Command Injection (CVE-ID: CVE-2023-35962)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the decompression functionality. A remote attacker can trick the victim to open a specially crafted wave file and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


35) OS Command Injection (CVE-ID: CVE-2023-35964)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the decompression functionality. A remote attacker can trick the victim to open a specially crafted wave file and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


36) OS Command Injection (CVE-ID: CVE-2023-35960)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the decompression functionality. A remote attacker can trick the victim to open a specially crafted wave file and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


37) Out-of-bounds write (CVE-ID: CVE-2023-38648)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the VZT vzt_rd_get_facname decompression functionality. A remote attacker can create a specially crafted .vzt file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


38) Out-of-bounds write (CVE-ID: CVE-2023-38649)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the VZT vzt_rd_get_facname decompression functionality. A remote attacker can create a specially crafted .vzt file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


39) Out-of-bounds write (CVE-ID: CVE-2023-37282)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the VZT LZMA_Read dmem extraction functionality. A remote attacker can create a specially crafted .vzt file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


40) Integer overflow (CVE-ID: CVE-2023-35004)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the VZT longest_len value allocation functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


41) Buffer overflow (CVE-ID: CVE-2023-37923)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the VCD sorted bsearch functionality. A remote attacker can create a specially crafted .vcd file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


42) Buffer overflow (CVE-ID: CVE-2023-37922)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the VCD sorted bsearch functionality. A remote attacker can create a specially crafted .vcd file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


43) Stack-based buffer overflow (CVE-ID: CVE-2023-35703)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the FST LEB128 varint functionality. A remote unauthenticated attacker can trick the victim to open a specially crafted .fst file, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


44) OS Command Injection (CVE-ID: CVE-2023-35959)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the decompression functionality. A remote attacker can trick the victim to open a specially crafted wave file and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


45) Heap-based buffer overflow (CVE-ID: CVE-2023-35970)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 chain_table parsing functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


46) OS Command Injection (CVE-ID: CVE-2023-35961)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the decompression functionality. A remote attacker can trick the victim to open a specially crafted wave file and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


47) Stack-based buffer overflow (CVE-ID: CVE-2023-35704)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the FST LEB128 varint functionality. A remote unauthenticated attacker can trick the victim to open a specially crafted .fst file, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


48) Stack-based buffer overflow (CVE-ID: CVE-2023-35702)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the FST LEB128 varint functionality. A remote unauthenticated attacker can trick the victim to open a specially crafted .fst file, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


49) Integer overflow (CVE-ID: CVE-2023-39316)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the LXT2 num_dict_entries functionality. A remote attacker can trick the victim to open a specially crafted .lxt2  file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


50) Integer overflow (CVE-ID: CVE-2023-39270)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the LXT2 facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .lxt2 file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


51) Integer overflow (CVE-ID: CVE-2023-39274)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the LXT2 facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .lxt2 file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


52) Integer overflow (CVE-ID: CVE-2023-39273)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the LXT2 facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .lxt2 file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


53) Integer overflow (CVE-ID: CVE-2023-39272)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the LXT2 facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .lxt2 file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


54) Integer overflow (CVE-ID: CVE-2023-39275)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the LXT2 facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .lxt2 file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


55) Integer overflow (CVE-ID: CVE-2023-39271)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the LXT2 facgeometry parsing functionality. A remote attacker can trick the victim to open a specially crafted .lxt2 file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


56) Heap-based buffer overflow (CVE-ID: CVE-2023-35958)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 VCDATA parsing functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.


57) Integer overflow (CVE-ID: CVE-2023-35992)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the FST fstReaderIterBlocks2 vesc allocation functionality when compiled as a 32-bit binary. A remote attacker can trick the victim to open a specially crafted .fst  file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


58) Heap-based buffer overflow (CVE-ID: CVE-2023-35956)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 VCDATA parsing functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.


59) Heap-based buffer overflow (CVE-ID: CVE-2023-35955)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 VCDATA parsing functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.


60) Heap-based buffer overflow (CVE-ID: CVE-2023-35957)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 VCDATA parsing functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.


61) Heap-based buffer overflow (CVE-ID: CVE-2023-36747)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 fstWritex len functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


62) Heap-based buffer overflow (CVE-ID: CVE-2023-36746)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the fstReaderIterBlocks2 fstWritex len functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


63) Integer overflow (CVE-ID: CVE-2023-38651)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the VZT vzt_rd_block_vch_decode times parsing functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


64) Integer overflow (CVE-ID: CVE-2023-36915)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the FST fstReaderIterBlocks2 chain_table allocation functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


65) Use-after-free (CVE-ID: CVE-2023-37576)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the VCD get_vartoken realloc functionality. A remote attacker can trick the victim to open a specially crafted .vcd file, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


66) Use-after-free (CVE-ID: CVE-2023-37577)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the VCD get_vartoken realloc functionality. A remote attacker can trick the victim to open a specially crafted .vcd file, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


67) Use-after-free (CVE-ID: CVE-2023-37578)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the VCD get_vartoken realloc functionality. A remote attacker can trick the victim to open a specially crafted .vcd file, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


68) Use-after-free (CVE-ID: CVE-2023-37575)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the VCD get_vartoken realloc functionality. A remote attacker can trick the victim to open a specially crafted .vcd file, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


69) Use-after-free (CVE-ID: CVE-2023-37573)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the VCD get_vartoken realloc functionality. A remote attacker can trick the victim to open a specially crafted .vcd file, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


70) Integer overflow (CVE-ID: CVE-2023-38650)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the VZT vzt_rd_block_vch_decode times parsing functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


71) Use-after-free (CVE-ID: CVE-2023-37574)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in the VCD get_vartoken realloc functionality. A remote attacker can trick the victim to open a specially crafted .vcd file, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


72) Out-of-bounds write (CVE-ID: CVE-2023-37418)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the VCD parse_valuechange portdump functionality. A remote attacker can create a specially crafted .vcd file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


73) Out-of-bounds write (CVE-ID: CVE-2023-37420)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the VCD parse_valuechange portdump functionality. A remote attacker can create a specially crafted .vcd file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


74) Out-of-bounds write (CVE-ID: CVE-2023-37419)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the VCD parse_valuechange portdump functionality. A remote attacker can create a specially crafted .vcd file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


75) Integer overflow (CVE-ID: CVE-2023-39317)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the LXT2 num_dict_entries functionality. A remote attacker can trick the victim to open a specially crafted .lxt2  file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


76) Out-of-bounds write (CVE-ID: CVE-2023-37417)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the VCD parse_valuechange portdump functionality. A remote attacker can create a specially crafted .vcd file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


77) Out-of-bounds write (CVE-ID: CVE-2023-37416)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the VCD parse_valuechange portdump functionality. A remote attacker can create a specially crafted .vcd file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


78) Integer overflow (CVE-ID: CVE-2023-38652)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the VZT vzt_rd_block_vch_decode dict parsing functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


79) Out-of-bounds write (CVE-ID: CVE-2023-36861)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the VZT LZMA_read_varint functionality. A remote attacker can create a specially crafted .vzt file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


80) Integer overflow (CVE-ID: CVE-2023-32650)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the FST_BL_GEOM parsing maxhandle functionality when compiled as a 32-bit binary. A remote attacker can trick the victim to open a specially crafted .fst file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


81) Integer overflow (CVE-ID: CVE-2023-38653)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the VZT vzt_rd_block_vch_decode dict parsing functionality. A remote attacker can trick the victim to open a specially crafted .vzt file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


82) Integer overflow (CVE-ID: CVE-2023-36916)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the FST fstReaderIterBlocks2 chain_table allocation functionality. A remote attacker can trick the victim to open a specially crafted .fst file, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.

References