HIGH · 8.8

CVE-2023-5217

Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chr...

Vulnerability Description

Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
WebmprojectLibvpx< 1.13.1
MicrosoftEdge116.0.1938.98
MicrosoftEdge Chromium116.0.5845.229
MozillaFirefox< 115.3.1
MozillaThunderbird< 115.3.1
FedoraprojectFedora37
DebianDebian Linux10.0
AppleIpados>= 17.0, < 17.0.3
AppleIphone Os>= 17.0, < 17.0.3
GoogleChrome< 117.0.5938.132
RedhatEnterprise Linux9.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-5217?

CVE-2023-5217 is a vulnerability with a CVSS score of 8.8 (HIGH). Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chr...

How severe is CVE-2023-5217?

CVE-2023-5217 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-5217?

Check the references section above for vendor advisories and patch information. Affected products include: Webmproject Libvpx, Microsoft Edge, Microsoft Edge Chromium, Mozilla Firefox, Mozilla Thunderbird.