ghsa-j7hp-h8jx-5ppr
Vulnerability from github
Published
2023-09-12 15:30
Modified
2024-02-12 15:56
Summary
libwebp: OOB write in BuildHuffmanTable
Details

Heap buffer overflow in libwebp allow a remote attacker to perform an out of bounds memory write via a crafted HTML page.

Show details on source website


{
   affected: [
      {
         package: {
            ecosystem: "crates.io",
            name: "libwebp-sys2",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "0.1.8",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "crates.io",
            name: "libwebp-sys",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "0.9.3",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "npm",
            name: "electron",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "22.0.0",
                  },
                  {
                     fixed: "22.3.24",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "npm",
            name: "electron",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "24.0.0",
                  },
                  {
                     fixed: "24.8.3",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "npm",
            name: "electron",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "25.0.0",
                  },
                  {
                     fixed: "25.8.1",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "npm",
            name: "electron",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "26.0.0",
                  },
                  {
                     fixed: "26.2.1",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "npm",
            name: "electron",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "27.0.0-beta.1",
                  },
                  {
                     fixed: "27.0.0-beta.2",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "NuGet",
            name: "SkiaSharp",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "2.0.0",
                  },
                  {
                     fixed: "2.88.6",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "Go",
            name: "github.com/chai2010/webp",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "1.0.0",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "PyPI",
            name: "Pillow",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "10.0.1",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "crates.io",
            name: "webp",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "0.2.6",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "NuGet",
            name: "magick.net-q16-anycpu",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "13.3.0",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "NuGet",
            name: "magick.net-q16-hdri-anycpu",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "13.3.0",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "NuGet",
            name: "magick.net-q16-x64",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "13.3.0",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "NuGet",
            name: "magick.net-q8-anycpu",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "13.3.0",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "NuGet",
            name: "magick.net-q8-openmp-x64",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "13.3.0",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
      {
         package: {
            ecosystem: "NuGet",
            name: "magick.net-q8-x64",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "13.3.0",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
      },
   ],
   aliases: [
      "CVE-2023-4863",
   ],
   database_specific: {
      cwe_ids: [
         "CWE-787",
      ],
      github_reviewed: true,
      github_reviewed_at: "2023-09-14T16:20:50Z",
      nvd_published_at: "2023-09-12T15:15:24Z",
      severity: "HIGH",
   },
   details: "Heap buffer overflow in libwebp allow a remote attacker to perform an out of bounds memory write via a crafted HTML page. ",
   id: "GHSA-j7hp-h8jx-5ppr",
   modified: "2024-02-12T15:56:30Z",
   published: "2023-09-12T15:30:20Z",
   references: [
      {
         type: "ADVISORY",
         url: "https://nvd.nist.gov/vuln/detail/CVE-2023-4863",
      },
      {
         type: "WEB",
         url: "https://github.com/qnighy/libwebp-sys2-rs/pull/21",
      },
      {
         type: "WEB",
         url: "https://github.com/python-pillow/Pillow/pull/7395",
      },
      {
         type: "WEB",
         url: "https://github.com/jaredforth/webp/pull/30",
      },
      {
         type: "WEB",
         url: "https://github.com/electron/electron/pull/39823",
      },
      {
         type: "WEB",
         url: "https://github.com/electron/electron/pull/39825",
      },
      {
         type: "WEB",
         url: "https://github.com/electron/electron/pull/39826",
      },
      {
         type: "WEB",
         url: "https://github.com/electron/electron/pull/39827",
      },
      {
         type: "WEB",
         url: "https://github.com/electron/electron/pull/39828",
      },
      {
         type: "WEB",
         url: "https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a",
      },
      {
         type: "WEB",
         url: "https://github.com/qnighy/libwebp-sys2-rs/commit/4560c473a76ec8bd8c650f19ddf9d7a44f719f8b",
      },
      {
         type: "WEB",
         url: "https://github.com/jaredforth/webp/commit/9d4c56e63abecc777df71c702503c3eaabd7dcbc",
      },
      {
         type: "WEB",
         url: "https://security.gentoo.org/glsa/202401-10",
      },
      {
         type: "WEB",
         url: "https://security.gentoo.org/glsa/202309-05",
      },
      {
         type: "WEB",
         url: "https://security-tracker.debian.org/tracker/CVE-2023-4863",
      },
      {
         type: "WEB",
         url: "https://rustsec.org/advisories/RUSTSEC-2023-0061.html",
      },
      {
         type: "WEB",
         url: "https://rustsec.org/advisories/RUSTSEC-2023-0060.html",
      },
      {
         type: "WEB",
         url: "https://pillow.readthedocs.io/en/stable/releasenotes/10.0.1.html#security",
      },
      {
         type: "WEB",
         url: "https://news.ycombinator.com/item?id=37478403",
      },
      {
         type: "WEB",
         url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863",
      },
      {
         type: "WEB",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I",
      },
      {
         type: "WEB",
         url: "https://security.netapp.com/advisory/ntap-20230929-0011",
      },
      {
         type: "WEB",
         url: "https://sethmlarson.dev/security-developer-in-residence-weekly-report-16",
      },
      {
         type: "WEB",
         url: "https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863",
      },
      {
         type: "WEB",
         url: "https://www.bentley.com/advisories/be-2023-0001",
      },
      {
         type: "WEB",
         url: "https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks",
      },
      {
         type: "WEB",
         url: "https://www.debian.org/security/2023/dsa-5496",
      },
      {
         type: "WEB",
         url: "https://www.debian.org/security/2023/dsa-5497",
      },
      {
         type: "WEB",
         url: "https://www.debian.org/security/2023/dsa-5498",
      },
      {
         type: "WEB",
         url: "https://www.mozilla.org/en-US/security/advisories/mfsa2023-40",
      },
      {
         type: "WEB",
         url: "https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway",
      },
      {
         type: "WEB",
         url: "https://blog.isosceles.com/the-webp-0day",
      },
      {
         type: "WEB",
         url: "https://bugzilla.suse.com/show_bug.cgi?id=1215231",
      },
      {
         type: "WEB",
         url: "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html",
      },
      {
         type: "WEB",
         url: "https://crbug.com/1479274",
      },
      {
         type: "WEB",
         url: "https://en.bandisoft.com/honeyview/history",
      },
      {
         type: "WEB",
         url: "https://github.com/ImageMagick/ImageMagick/discussions/6664",
      },
      {
         type: "WEB",
         url: "https://github.com/dlemstra/Magick.NET/releases/tag/13.3.0",
      },
      {
         type: "PACKAGE",
         url: "https://github.com/webmproject/libwebp",
      },
      {
         type: "WEB",
         url: "https://github.com/webmproject/libwebp/releases/tag/v1.3.2",
      },
      {
         type: "WEB",
         url: "https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html",
      },
      {
         type: "WEB",
         url: "https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html",
      },
      {
         type: "WEB",
         url: "https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html",
      },
      {
         type: "WEB",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT",
      },
      {
         type: "WEB",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645",
      },
      {
         type: "WEB",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3",
      },
      {
         type: "WEB",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX",
      },
      {
         type: "WEB",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX",
      },
      {
         type: "WEB",
         url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/21/4",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/22/1",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/22/3",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/22/4",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/22/5",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/22/6",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/22/7",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/22/8",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/26/1",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/26/7",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/28/1",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/28/2",
      },
      {
         type: "WEB",
         url: "http://www.openwall.com/lists/oss-security/2023/09/28/4",
      },
   ],
   schema_version: "1.4.0",
   severity: [
      {
         score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
         type: "CVSS_V3",
      },
   ],
   summary: "libwebp: OOB write in BuildHuffmanTable",
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.