CVE-2023-4863

high

Description

Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

From the Tenable Blog

CVE-2023-41064, CVE-2023-4863, CVE-2023-5129: Frequently Asked Questions for ImageIO and WebP/libwebp Zero-Day Vulnerabilities
CVE-2023-41064, CVE-2023-4863, CVE-2023-5129: Frequently Asked Questions for ImageIO and WebP/libwebp Zero-Day Vulnerabilities

Published: 2023-09-28

Frequently asked questions relating to vulnerabilities in Apple, Google and the open source libwebp library.

References

https://bugzilla.suse.com/show_bug.cgi?id=1215231

https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html

https://crbug.com/1479274

https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a

https://github.com/webmproject/libwebp/releases/tag/v1.3.2

https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html

https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html

https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/

https://lists.fedoraproject.org/archives/list/[email protected]/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/

https://lists.fedoraproject.org/archives/list/[email protected]/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/

https://lists.fedoraproject.org/archives/list/[email protected]/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/

https://lists.fedoraproject.org/archives/list/[email protected]/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/

https://lists.fedoraproject.org/archives/list/[email protected]/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/

https://lists.fedoraproject.org/archives/list/[email protected]/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863

https://security.gentoo.org/glsa/202309-05

https://security.netapp.com/advisory/ntap-20230929-0011/

https://security-tracker.debian.org/tracker/CVE-2023-4863

https://www.debian.org/security/2023/dsa-5496

https://www.debian.org/security/2023/dsa-5497

https://www.debian.org/security/2023/dsa-5498

https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/

http://www.openwall.com/lists/oss-security/2023/09/21/4

http://www.openwall.com/lists/oss-security/2023/09/22/1

http://www.openwall.com/lists/oss-security/2023/09/22/3

http://www.openwall.com/lists/oss-security/2023/09/22/4

http://www.openwall.com/lists/oss-security/2023/09/22/5

http://www.openwall.com/lists/oss-security/2023/09/22/6

http://www.openwall.com/lists/oss-security/2023/09/22/7

http://www.openwall.com/lists/oss-security/2023/09/22/8

http://www.openwall.com/lists/oss-security/2023/09/26/1

http://www.openwall.com/lists/oss-security/2023/09/26/7

http://www.openwall.com/lists/oss-security/2023/09/28/1

http://www.openwall.com/lists/oss-security/2023/09/28/2

http://www.openwall.com/lists/oss-security/2023/09/28/4

Details

Source: Mitre, NVD

Published: 2023-09-12

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High