ghsa-j7hp-h8jx-5ppr
Vulnerability from github
Published
2023-09-12 15:30
Modified
2024-02-12 15:56
Severity ?
Summary
libwebp: OOB write in BuildHuffmanTable
Details
Heap buffer overflow in libwebp allow a remote attacker to perform an out of bounds memory write via a crafted HTML page.
{ "affected": [ { "package": { "ecosystem": "crates.io", "name": "libwebp-sys2" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.1.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "crates.io", "name": "libwebp-sys" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.9.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "electron" }, "ranges": [ { "events": [ { "introduced": "22.0.0" }, { "fixed": "22.3.24" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "electron" }, "ranges": [ { "events": [ { "introduced": "24.0.0" }, { "fixed": "24.8.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "electron" }, "ranges": [ { "events": [ { "introduced": "25.0.0" }, { "fixed": "25.8.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "electron" }, "ranges": [ { "events": [ { "introduced": "26.0.0" }, { "fixed": "26.2.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "electron" }, "ranges": [ { "events": [ { "introduced": "27.0.0-beta.1" }, { "fixed": "27.0.0-beta.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "SkiaSharp" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "fixed": "2.88.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/chai2010/webp" }, "ranges": [ { "events": [ { "introduced": "1.0.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "Pillow" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "10.0.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "crates.io", "name": "webp" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.2.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "magick.net-q16-anycpu" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "13.3.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "magick.net-q16-hdri-anycpu" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "13.3.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "magick.net-q16-x64" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "13.3.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "magick.net-q8-anycpu" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "13.3.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "magick.net-q8-openmp-x64" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "13.3.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "magick.net-q8-x64" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "13.3.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-4863" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": true, "github_reviewed_at": "2023-09-14T16:20:50Z", "nvd_published_at": "2023-09-12T15:15:24Z", "severity": "HIGH" }, "details": "Heap buffer overflow in libwebp allow a remote attacker to perform an out of bounds memory write via a crafted HTML page. ", "id": "GHSA-j7hp-h8jx-5ppr", "modified": "2024-02-12T15:56:30Z", "published": "2023-09-12T15:30:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4863" }, { "type": "WEB", "url": "https://github.com/qnighy/libwebp-sys2-rs/pull/21" }, { "type": "WEB", "url": "https://github.com/python-pillow/Pillow/pull/7395" }, { "type": "WEB", "url": "https://github.com/jaredforth/webp/pull/30" }, { "type": "WEB", "url": "https://github.com/electron/electron/pull/39823" }, { "type": "WEB", "url": "https://github.com/electron/electron/pull/39825" }, { "type": "WEB", "url": "https://github.com/electron/electron/pull/39826" }, { "type": "WEB", "url": "https://github.com/electron/electron/pull/39827" }, { "type": "WEB", "url": "https://github.com/electron/electron/pull/39828" }, { "type": "WEB", "url": "https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a" }, { "type": "WEB", "url": "https://github.com/qnighy/libwebp-sys2-rs/commit/4560c473a76ec8bd8c650f19ddf9d7a44f719f8b" }, { "type": "WEB", "url": "https://github.com/jaredforth/webp/commit/9d4c56e63abecc777df71c702503c3eaabd7dcbc" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202401-10" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202309-05" }, { "type": "WEB", "url": "https://security-tracker.debian.org/tracker/CVE-2023-4863" }, { "type": "WEB", "url": "https://rustsec.org/advisories/RUSTSEC-2023-0061.html" }, { "type": "WEB", "url": "https://rustsec.org/advisories/RUSTSEC-2023-0060.html" }, { "type": "WEB", "url": "https://pillow.readthedocs.io/en/stable/releasenotes/10.0.1.html#security" }, { "type": "WEB", "url": "https://news.ycombinator.com/item?id=37478403" }, { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20230929-0011" }, { "type": "WEB", "url": "https://sethmlarson.dev/security-developer-in-residence-weekly-report-16" }, { "type": "WEB", "url": "https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863" }, { "type": "WEB", "url": "https://www.bentley.com/advisories/be-2023-0001" }, { "type": "WEB", "url": "https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks" }, { "type": "WEB", "url": "https://www.debian.org/security/2023/dsa-5496" }, { "type": "WEB", "url": "https://www.debian.org/security/2023/dsa-5497" }, { "type": "WEB", "url": "https://www.debian.org/security/2023/dsa-5498" }, { "type": "WEB", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-40" }, { "type": "WEB", "url": "https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway" }, { "type": "WEB", "url": "https://blog.isosceles.com/the-webp-0day" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1215231" }, { "type": "WEB", "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html" }, { "type": "WEB", "url": "https://crbug.com/1479274" }, { "type": "WEB", "url": "https://en.bandisoft.com/honeyview/history" }, { "type": "WEB", "url": "https://github.com/ImageMagick/ImageMagick/discussions/6664" }, { "type": "WEB", "url": "https://github.com/dlemstra/Magick.NET/releases/tag/13.3.0" }, { "type": "PACKAGE", "url": "https://github.com/webmproject/libwebp" }, { "type": "WEB", "url": "https://github.com/webmproject/libwebp/releases/tag/v1.3.2" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/21/4" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/4" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/5" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/6" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/7" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/8" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/26/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/26/7" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/28/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/28/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/09/28/4" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "libwebp: OOB write in BuildHuffmanTable" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.