Date Vulnerability was discovered by Citizen Lab: September 6th/7th
Date Known to the Public: Tuesday 12th September 2023
The heap buffer overflow (CVE-2023-4863) vulnerability in the WebP Codec is being actively exploited in the wild.
Heap buffer overflow in WebP in Google Chrome prior to 116.0.5845.187 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
The security flaw is caused by a heap buffer overflow in the WebP code library (libwebp), whose impact spans from crashes to arbitrary code execution. Opening a malicious WebP image could lead to a heap buffer overflow in the content process.
Google Chrome and Mozilla Firefox, among other browsers, use WebP for its efficient image compression capabilities. A malicious exploitation of this flaw could potentially jeopardize the security of millions of internet users.
Very. If an attacker can exploit a heap buffer overflow, they might be able to take control of a system, steal data, or introduce malware.
If someone knows a program has a heap buffer overflow vulnerability, they might be able to send it specially crafted data that causes the program to behave in unexpected ways. For instance, they could potentially run malicious code or gain unauthorized access to a system.
A codec is like a translator that helps your computer understand and display WebP images (a format like JPEG or PNG). If this codec has a heap buffer overflow, an attacker might be able to craft a malicious WebP image that, when viewed, exploits this vulnerability to harm your computer or steal information.
To note: This vulnerability is not just for web browsers but for applications as well that uses the libwebp library. Here are some examples: Affinity, Gimp, Inkspace, LibreOffice, Telegram, ffmpeg and many other Android applications as well as cross-platform apps built with Flutter.