CVE-2023-4863

high

Description

Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

From the Tenable Blog

CVE-2023-41064, CVE-2023-4863, CVE-2023-5129: Frequently Asked Questions for ImageIO and WebP/libwebp Zero-Day Vulnerabilities
CVE-2023-41064, CVE-2023-4863, CVE-2023-5129: Frequently Asked Questions for ImageIO and WebP/libwebp Zero-Day Vulnerabilities

Published: 2023-09-28

Frequently asked questions relating to vulnerabilities in Apple, Google and the open source libwebp library.

References

https://www.debian.org/security/2023/dsa-5497

https://www.debian.org/security/2023/dsa-5496

https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/

https://sethmlarson.dev/security-developer-in-residence-weekly-report-16

https://news.ycombinator.com/item?id=37478403

https://lists.fedoraproject.org/archives/list/[email protected]/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/

https://lists.fedoraproject.org/archives/list/[email protected]/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/

https://lists.fedoraproject.org/archives/list/[email protected]/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/

https://lists.fedoraproject.org/archives/list/[email protected]/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/

https://lists.fedoraproject.org/archives/list/[email protected]/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/

https://lists.fedoraproject.org/archives/list/[email protected]/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/

https://lists.fedoraproject.org/archives/list/[email protected]/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/

https://github.com/webmproject/libwebp/releases/tag/v1.3.2

https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a

https://en.bandisoft.com/honeyview/history/

https://crbug.com/1479274

https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html

https://blog.isosceles.com/the-webp-0day/

http://www.openwall.com/lists/oss-security/2023/09/28/4

http://www.openwall.com/lists/oss-security/2023/09/28/2

http://www.openwall.com/lists/oss-security/2023/09/28/1

http://www.openwall.com/lists/oss-security/2023/09/26/7

http://www.openwall.com/lists/oss-security/2023/09/26/1

http://www.openwall.com/lists/oss-security/2023/09/22/8

http://www.openwall.com/lists/oss-security/2023/09/22/7

http://www.openwall.com/lists/oss-security/2023/09/22/6

http://www.openwall.com/lists/oss-security/2023/09/22/5

http://www.openwall.com/lists/oss-security/2023/09/22/4

http://www.openwall.com/lists/oss-security/2023/09/22/3

http://www.openwall.com/lists/oss-security/2023/09/22/1

http://www.openwall.com/lists/oss-security/2023/09/21/4

Details

Source: Mitre, NVD

Published: 2023-09-12

Updated: 2025-03-13

Known Exploited Vulnerability (KEV)

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.93949