8.8

CVE-2023-4863

Warning
Exploit

Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

Data is provided by the National Vulnerability Database (NVD)
GoogleChrome Version < 116.0.5845.187
FedoraprojectFedora Version37
FedoraprojectFedora Version38
FedoraprojectFedora Version39
DebianDebian Linux Version10.0
DebianDebian Linux Version11.0
DebianDebian Linux Version12.0
MozillaFirefox SwEditionesr Version < 102.15.1
MozillaFirefox SwEdition- Version < 117.0.1
MozillaFirefox SwEditionesr Version >= 115.1.0 < 115.2.1
MozillaThunderbird Version < 102.15.1
MozillaThunderbird Version >= 115.0 < 115.2.2
MicrosoftEdge Chromium Version < 116.0.1938.81
MicrosoftTeams SwPlatformmacos Version < 1.6.00.26463
MicrosoftTeams SwEditiondesktop Version < 1.6.00.26474
MicrosoftWebp Image Extension Version < 1.0.62681.0
WebmprojectLibwebp Version < 1.3.2
NetappActive Iq Unified Manager Version- SwPlatformvmware_vsphere
BentleySeequent Leapfrog Version < 2023.2
BandisoftHoneyview Version < 5.51

13.09.2023: CISA Known Exploited Vulnerabilities (KEV) Catalog

Google Chromium WebP Heap-Based Buffer Overflow Vulnerability

Vulnerability

Google Chromium WebP contains a heap-based buffer overflow vulnerability that allows a remote attacker to perform an out-of-bounds memory write via a crafted HTML page. This vulnerability can affect applications that use the WebP Codec.

Description

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 93.95% 0.999
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

https://blog.isosceles.com/the-webp-0day/
Third Party Advisory
Exploit
https://bugzilla.suse.com/show_bug.cgi?id=1215231
Third Party Advisory
Issue Tracking
https://crbug.com/1479274
Vendor Advisory
Issue Tracking
https://news.ycombinator.com/item?id=37478403
Third Party Advisory
Exploit
https://www.debian.org/security/2023/dsa-5498
Third Party Advisory
Mailing List