7.3 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.2 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.1%
Multiple integer underflow vulnerabilities exist in the LXT2
lxt2_rd_iter_radix shift operation functionality of GTKWave 3.3.115. A
specially crafted .lxt2 file can lead to memory corruption. A victim would
need to open a malicious file to trigger these vulnerabilities.This
vulnerability concerns the integer underflow when performing the right
shift operation.
7.3 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.2 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.1%