Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/chai2010/webp
  4. ›
  5. CVE-2023-4863

CVE-2023-4863: Out-of-bounds Write

September 12, 2023 (updated September 22, 2023)

Heap buffer overflow in WebP in Google Chrome prior to 116.0.5845.187 allowed a remote attacker to perform an out-of-bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

References

  • www.openwall.com/lists/oss-security/2023/09/21/4
  • www.openwall.com/lists/oss-security/2023/09/22/1
  • www.openwall.com/lists/oss-security/2023/09/22/3
  • www.openwall.com/lists/oss-security/2023/09/22/4
  • www.openwall.com/lists/oss-security/2023/09/22/5
  • www.openwall.com/lists/oss-security/2023/09/22/6
  • www.openwall.com/lists/oss-security/2023/09/22/7
  • www.openwall.com/lists/oss-security/2023/09/22/8
  • adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/
  • blog.isosceles.com/the-webp-0day/
  • bugzilla.suse.com/show_bug.cgi?id=1215231
  • chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
  • crbug.com/1479274
  • en.bandisoft.com/honeyview/history/
  • github.com/advisories/GHSA-j7hp-h8jx-5ppr
  • github.com/electron/electron/pull/39823
  • github.com/electron/electron/pull/39825
  • github.com/electron/electron/pull/39826
  • github.com/electron/electron/pull/39827
  • github.com/electron/electron/pull/39828
  • github.com/qnighy/libwebp-sys2-rs/commit/4560c473a76ec8bd8c650f19ddf9d7a44f719f8b
  • github.com/qnighy/libwebp-sys2-rs/pull/21
  • github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a
  • github.com/webmproject/libwebp/releases/tag/v1.3.2
  • lists.debian.org/debian-lts-announce/2023/09/msg00015.html
  • lists.debian.org/debian-lts-announce/2023/09/msg00016.html
  • lists.debian.org/debian-lts-announce/2023/09/msg00017.html
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/
  • msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863
  • news.ycombinator.com/item?id=37478403
  • nvd.nist.gov/vuln/detail/CVE-2023-4863
  • rustsec.org/advisories/RUSTSEC-2023-0060.html
  • rustsec.org/advisories/RUSTSEC-2023-0061.html
  • security-tracker.debian.org/tracker/CVE-2023-4863
  • security.gentoo.org/glsa/202309-05
  • stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/
  • www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/
  • www.debian.org/security/2023/dsa-5496
  • www.debian.org/security/2023/dsa-5497
  • www.debian.org/security/2023/dsa-5498
  • www.mozilla.org/en-US/security/advisories/mfsa2023-40/

Code Behaviors & Features

Detect and mitigate CVE-2023-4863 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.0.0

Solution

Unfortunately, there is no solution available yet.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-787: Out-of-bounds Write

Source file

go/github.com/chai2010/webp/CVE-2023-4863.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:41 +0000.