Ad

CVE-2026-33147

HIGH CVSS 3.1: 7.8 EPSS 0.01%
Updated Mar 27, 2026
Gmt
Parameter Value
CVSS 7.8 (HIGH)
Affected Versions before 6.6.0
Type CWE-121 (Stack-based Buffer Overflow)
Vendor Gmt
Public PoC No

GMT is an open source collection of command-line tools for manipulating geographic and Cartesian data sets. In versions from 6.6.0 and prior, a stack-based buffer overflow vulnerability was identified in the gmt_remote_dataset_id function within src/gmt_remote.c. This issue occurs when a specially crafted long string is passed as a dataset identifier (e.g., via the which module), leading to a crash or potential arbitrary code execution.

This issue has been patched via commit 0ad2b49.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Generic-Mapping-Tools Gmt
cpe:2.3:a:generic-mapping-tools:gmt:*:*:*:*:*:*:*:*
<= 6.6.0