CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
97.9%
various libraries that include webp are vulnerable to Heap Buffer Overflow. The vulnerability is caused by an out of bounds heap memory write in a function BuildHuffmanTable
in file src/dec/vp8l_dec.c
in library libwebp
. This can potentially overwrite adjacent memory and corrupt data and can be exploited by hackers take over systems and devices remotely.
www.openwall.com/lists/oss-security/2023/09/21/4
www.openwall.com/lists/oss-security/2023/09/22/1
www.openwall.com/lists/oss-security/2023/09/22/3
www.openwall.com/lists/oss-security/2023/09/22/4
www.openwall.com/lists/oss-security/2023/09/22/5
www.openwall.com/lists/oss-security/2023/09/22/6
www.openwall.com/lists/oss-security/2023/09/22/7
www.openwall.com/lists/oss-security/2023/09/22/8
www.openwall.com/lists/oss-security/2023/09/26/1
www.openwall.com/lists/oss-security/2023/09/26/7
www.openwall.com/lists/oss-security/2023/09/28/1
www.openwall.com/lists/oss-security/2023/09/28/2
www.openwall.com/lists/oss-security/2023/09/28/4
adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/
blog.isosceles.com/the-webp-0day/
blog.isosceles.com/the-webp-0day/
bugzilla.suse.com/show_bug.cgi?id=1215231
chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
crbug.com/1479274
en.bandisoft.com/honeyview/history/
github.com/chai2010/webp/issues/61
github.com/chai2010/webp/pull/62
github.com/electron/electron/pull/39823
github.com/electron/electron/pull/39824
github.com/electron/electron/pull/39825
github.com/electron/electron/pull/39826
github.com/electron/electron/pull/39827
github.com/mistymntncop/CVE-2023-4863
github.com/mono/SkiaSharp/commit/039e66ae1778cf25b83a87e460d0c202852884d4
github.com/mono/SkiaSharp/issues/2608
github.com/python-pillow/Pillow/commit/730f74600e8215ab510f71bb1fbb49d906c4356b
github.com/python-pillow/Pillow/issues/7425
github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a
github.com/webmproject/libwebp/releases/tag/v1.3.2
lists.debian.org/debian-lts-announce/2023/09/msg00015.html
lists.debian.org/debian-lts-announce/2023/09/msg00016.html
lists.debian.org/debian-lts-announce/2023/09/msg00017.html
lists.fedoraproject.org/archives/list/[email protected]/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
lists.fedoraproject.org/archives/list/[email protected]/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/
lists.fedoraproject.org/archives/list/[email protected]/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
lists.fedoraproject.org/archives/list/[email protected]/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/
lists.fedoraproject.org/archives/list/[email protected]/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/
lists.fedoraproject.org/archives/list/[email protected]/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/
lists.fedoraproject.org/archives/list/[email protected]/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863
news.ycombinator.com/item?id=37478403
security-tracker.debian.org/tracker/CVE-2023-4863
security.gentoo.org/glsa/202309-05
security.gentoo.org/glsa/202401-10
security.netapp.com/advisory/ntap-20230929-0011/
sethmlarson.dev/security-developer-in-residence-weekly-report-16
stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/
www.bentley.com/advisories/be-2023-0001/
www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/
www.debian.org/security/2023/dsa-5496
www.debian.org/security/2023/dsa-5497
www.debian.org/security/2023/dsa-5498
www.mozilla.org/en-US/security/advisories/mfsa2023-40/