First published: Fri Feb 04 2022(Updated: )
A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon DCodeNumber parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
KiCad EDA | =6.0.1 | |
Red Hat Fedora | =35 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
Debian Linux | =11.0 | |
debian/kicad | 5.1.9+dfsg1-1+deb11u1 6.0.11+dfsg-1 9.0.1+dfsg-1 | |
=6.0.1 | ||
=35 | ||
=9.0 | ||
=10.0 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23947 is a critical vulnerability that can lead to code execution due to a stack-based buffer overflow.
To fix CVE-2022-23947, update KiCad EDA to version 6.0.11 or later.
CVE-2022-23947 affects KiCad EDA versions 6.0.1 and prior, as well as certain Debian and Fedora releases.
Yes, CVE-2022-23947 can be exploited remotely by an attacker providing a specially-crafted gerber or excellon file.
CVE-2022-23947 can enable arbitrary code execution on the target system when exploited.