Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-1999

Опубликовано: 29 сент. 2023
Источник: msrc
EPSS Низкий

Описание

Chromium: CVE-2023-1999 Use after free in libwebp

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

FAQ

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge VersionDate ReleasedBased on Chromium Version
114.0.1823.676/29/2023114.0.5735.198/199

Возможность эксплуатации

DOS

N/A

EPSS

Процентиль: 58%
0.00368
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 2 лет назад

There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.

CVSS3: 7.5
redhat
больше 2 лет назад

There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.

CVSS3: 5.3
nvd
около 2 лет назад

There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.

CVSS3: 5.3
debian
около 2 лет назад

There exists a use after free/double free in libwebp. An attacker can ...

suse-cvrf
около 2 лет назад

Security update for libwebp

EPSS

Процентиль: 58%
0.00368
Низкий