First published: Wed Feb 16 2022(Updated: )
A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadIJCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
KiCad | =6.0.1 | |
Red Hat Fedora | =35 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
Debian Linux | =11.0 | |
debian/kicad | 5.1.9+dfsg1-1+deb11u1 6.0.11+dfsg-1 9.0.1+dfsg-1 | |
=6.0.1 | ||
=35 | ||
=9.0 | ||
=10.0 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23804 is classified as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2022-23804, upgrade KiCad to version 6.0.11 or later, or apply relevant patches provided by your distribution.
CVE-2022-23804 affects KiCad version 6.0.1 and earlier, as well as specific versions of the software on Debian and Fedora.
Yes, CVE-2022-23804 can be exploited remotely by an attacker using specially-crafted gerber or excellon files.
CVE-2022-23804 is a stack-based buffer overflow vulnerability.