First published: Wed Feb 16 2022(Updated: )
A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadXYCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
KiCad | =6.0.1 | |
Red Hat Fedora | =35 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
Debian Linux | =11.0 | |
debian/kicad | 5.1.9+dfsg1-1+deb11u1 6.0.11+dfsg-1 9.0.1+dfsg-1 | |
=6.0.1 | ||
=35 | ||
=9.0 | ||
=10.0 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23803 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2022-23803, upgrade KiCad to version 6.0.11 or later for affected installations.
CVE-2022-23803 affects KiCad EDA versions prior to 6.0.11, as well as various Debian packages lower than specified versions.
The attack vector for CVE-2022-23803 involves the use of specially-crafted gerber or excellon files designed to exploit the vulnerability.
Yes, CVE-2022-23803 can be exploited remotely if an attacker is able to provide a malicious file to the victim.