CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
23.9%
GTKWave is vulnerable to multiple use-after-free in the VCD get_vartoken realloc functionality. The vulnerability is due to improper handling of memory deallocation, specifically when triggered via the GUI’s legacy VCD parsing code, which can be exploited by opening a specially crafted .vcd file, potentially leading to arbitrary code execution.