First published: Fri Feb 04 2022(Updated: )
A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon GCodeNumber parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
KiCad EDA | =6.0.1 | |
Red Hat Fedora | =35 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
Debian Linux | =11.0 | |
debian/kicad | 5.1.9+dfsg1-1+deb11u1 6.0.11+dfsg-1 9.0.1+dfsg-1 | |
=6.0.1 | ||
=35 | ||
=9.0 | ||
=10.0 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23946 has a high severity due to its potential to lead to remote code execution.
To fix CVE-2022-23946, you should upgrade to a patched version of KiCad EDA that addresses this vulnerability.
CVE-2022-23946 affects KiCad EDA version 6.0.1 and below.
Yes, CVE-2022-23946 can be exploited using specially-crafted gerber or excellon files.
Not addressing CVE-2022-23946 can leave systems vulnerable to potential remote code execution attacks.