[Warning] Webp image processing component vulnerability

Vulnerability description:

CVE-2023-4863 is a critical heap buffer overflow vulnerability in WebP, a raster graphics file format that replaces the JPEG, PNG, and GIF file formats.

Buffer overflows can cause crashes, infinite loops, and can be used to execute arbitrary code.

Impact of the vulnerability:

The vulnerability can be used for remote code execution and has been seen in wild exploits. webp image processing component is maintained and open-sourced by google and is widely referenced in mobile, PC, and server-side image processing scenarios. Most browsers (Chrome, Firefox, Breve, Tor Browser, etc.), many Linux distributions (Ubuntu, Debian, Gentoo, SUSE, etc.) .) , password managers (1Password, BitWarden, etc.) and other software (MS Teams, Slack, Telegram, Signal, Basecamp, Discord, GitHub Desktop, etc.).

Impact version:

libwebp <= 0.5 and < 1.3.2
chromium/chrome < 116.0.5845.187

Vulnerability verification:

https://github.com/mistymntncop/CVE-2023-4863

Vulnerability reference:

https://nvd.nist.gov/vuln/detail/CVE-2023-4863
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html?m=1

 

Original article by Chief Security Officer, if reproduced, please credit https://cncso.com/en/webp-codec-library-vulnerability-html

Like (1)
Previous September 23, 2023 8:30 am
Next October 9, 2023 12:00 pm

related suggestion