ghsa-j7hp-h8jx-5ppr
Vulnerability from github
Published
2023-09-12 15:30
Modified
2025-07-09 15:52
Severity ?
VLAI Severity ?
Summary
libwebp: OOB write in BuildHuffmanTable
Details
Heap buffer overflow in libwebp allow a remote attacker to perform an out of bounds memory write via a crafted HTML page.
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "libwebp-sys2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.1.8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "libwebp-sys"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.9.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "electron"
},
"ranges": [
{
"events": [
{
"introduced": "22.0.0"
},
{
"fixed": "22.3.24"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "electron"
},
"ranges": [
{
"events": [
{
"introduced": "24.0.0"
},
{
"fixed": "24.8.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "electron"
},
"ranges": [
{
"events": [
{
"introduced": "25.0.0"
},
{
"fixed": "25.8.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "electron"
},
"ranges": [
{
"events": [
{
"introduced": "26.0.0"
},
{
"fixed": "26.2.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "electron"
},
"ranges": [
{
"events": [
{
"introduced": "27.0.0-beta.1"
},
{
"fixed": "27.0.0-beta.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "SkiaSharp"
},
"ranges": [
{
"events": [
{
"introduced": "2.0.0"
},
{
"fixed": "2.88.6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/chai2010/webp"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.2"
},
{
"fixed": "1.4.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "Pillow"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "10.0.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "webp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "magick.net-q16-anycpu"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "13.3.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "magick.net-q16-hdri-anycpu"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "13.3.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "magick.net-q16-x64"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "13.3.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "magick.net-q8-anycpu"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "13.3.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "magick.net-q8-openmp-x64"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "13.3.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "magick.net-q8-x64"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "13.3.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/chai2010/webp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20250406010349-76805d5a8860"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "github.com/chai2010/webp"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.0"
},
{
"fixed": "1.1.2-0.20250406010349-76805d5a8860"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-4863"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": true,
"github_reviewed_at": "2023-09-14T16:20:50Z",
"nvd_published_at": "2023-09-12T15:15:24Z",
"severity": "HIGH"
},
"details": "Heap buffer overflow in libwebp allow a remote attacker to perform an out of bounds memory write via a crafted HTML page.",
"id": "GHSA-j7hp-h8jx-5ppr",
"modified": "2025-07-09T15:52:18Z",
"published": "2023-09-12T15:30:20Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4863"
},
{
"type": "WEB",
"url": "https://github.com/qnighy/libwebp-sys2-rs/pull/21"
},
{
"type": "WEB",
"url": "https://github.com/python-pillow/Pillow/pull/7395"
},
{
"type": "WEB",
"url": "https://github.com/jaredforth/webp/pull/30"
},
{
"type": "WEB",
"url": "https://github.com/electron/electron/pull/39823"
},
{
"type": "WEB",
"url": "https://github.com/electron/electron/pull/39825"
},
{
"type": "WEB",
"url": "https://github.com/electron/electron/pull/39826"
},
{
"type": "WEB",
"url": "https://github.com/electron/electron/pull/39827"
},
{
"type": "WEB",
"url": "https://github.com/electron/electron/pull/39828"
},
{
"type": "WEB",
"url": "https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a"
},
{
"type": "WEB",
"url": "https://github.com/qnighy/libwebp-sys2-rs/commit/4560c473a76ec8bd8c650f19ddf9d7a44f719f8b"
},
{
"type": "WEB",
"url": "https://github.com/jaredforth/webp/commit/9d4c56e63abecc777df71c702503c3eaabd7dcbc"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202401-10"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202309-05"
},
{
"type": "WEB",
"url": "https://security-tracker.debian.org/tracker/CVE-2023-4863"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2023-0061.html"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2023-0060.html"
},
{
"type": "WEB",
"url": "https://pillow.readthedocs.io/en/stable/releasenotes/10.0.1.html#security"
},
{
"type": "WEB",
"url": "https://news.ycombinator.com/item?id=37478403"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863"
},
{
"type": "WEB",
"url": "https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20230929-0011"
},
{
"type": "WEB",
"url": "https://sethmlarson.dev/security-developer-in-residence-weekly-report-16"
},
{
"type": "WEB",
"url": "https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863"
},
{
"type": "WEB",
"url": "https://www.bentley.com/advisories/be-2023-0001"
},
{
"type": "WEB",
"url": "https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2023/dsa-5496"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2023/dsa-5497"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2023/dsa-5498"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-40"
},
{
"type": "WEB",
"url": "https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863"
},
{
"type": "WEB",
"url": "https://blog.isosceles.com/the-webp-0day"
},
{
"type": "WEB",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1215231"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html"
},
{
"type": "WEB",
"url": "https://crbug.com/1479274"
},
{
"type": "WEB",
"url": "https://en.bandisoft.com/honeyview/history"
},
{
"type": "WEB",
"url": "https://github.com/ImageMagick/ImageMagick/discussions/6664"
},
{
"type": "WEB",
"url": "https://github.com/dlemstra/Magick.NET/releases/tag/13.3.0"
},
{
"type": "PACKAGE",
"url": "https://github.com/webmproject/libwebp"
},
{
"type": "WEB",
"url": "https://github.com/webmproject/libwebp/releases/tag/v1.3.2"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/21/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/3"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/5"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/6"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/7"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/8"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/26/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/26/7"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/28/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/28/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/09/28/4"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "libwebp: OOB write in BuildHuffmanTable"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…