An information disclosure vulnerability exists in the pick-and-place rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.8.0. A specially-crafted pick-and-place file can exploit the missing initialization of a structure to leak memory contents. An attacker can provide a malicious file to trigger this vulnerability.
The product does not initialize critical variables, which causes the execution environment to use unexpected values.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gerbv | Gerbv_project | 2.7.0 (including) | 2.7.0 (including) |
Gerbv | Gerbv_project | 2.8.0-forked_dev (including) | 2.8.0-forked_dev (including) |