Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-1999

Опубликовано: 11 апр. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.

The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

Отчет

Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7firefoxFixedRHSA-2023:179114.04.2023
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2023:180617.04.2023
Red Hat Enterprise Linux 7libwebpFixedRHSA-2023:207702.05.2023
Red Hat Enterprise Linux 8firefoxFixedRHSA-2023:178714.04.2023
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2023:180217.04.2023
Red Hat Enterprise Linux 8libwebpFixedRHSA-2023:207602.05.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsfirefoxFixedRHSA-2023:179214.04.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsthunderbirdFixedRHSA-2023:180317.04.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-415
https://bugzilla.redhat.com/show_bug.cgi?id=2186102Mozilla: libwebp: Double-free in libwebp

EPSS

Процентиль: 58%
0.00368
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 2 лет назад

There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.

CVSS3: 5.3
nvd
около 2 лет назад

There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.

msrc
почти 2 года назад

Chromium: CVE-2023-1999 Use after free in libwebp

CVSS3: 5.3
debian
около 2 лет назад

There exists a use after free/double free in libwebp. An attacker can ...

suse-cvrf
около 2 лет назад

Security update for libwebp

EPSS

Процентиль: 58%
0.00368
Низкий

7.5 High

CVSS3