vulnerability
Zimbra Collaboration: CVE-2023-4863: Heap-based Buffer Overflow vulnerability.
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | 09/12/2023 | 01/20/2025 | 03/18/2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
09/12/2023
Added
01/20/2025
Modified
03/18/2025
Description
Heap buffer overflow in libwebp in google chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted html page. (chromium security severity: critical)
Solution
zimbra-collaboration-upgrade-latest
References
- CVE-2023-4863
- https://attackerkb.com/topics/CVE-2023-4863
- URL-https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
- URL-https://crbug.com/1479274
- URL-https://en.bandisoft.com/honeyview/history/
- URL-https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/
- URL-https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
- URL-https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a
- URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863
- URL-https://security-tracker.debian.org/tracker/CVE-2023-4863
- URL-https://bugzilla.suse.com/show_bug.cgi?id=1215231
- URL-https://news.ycombinator.com/item?id=37478403
- URL-https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/
- URL-https://www.debian.org/security/2023/dsa-5496
- URL-https://www.debian.org/security/2023/dsa-5497
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/
- URL-https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/
- URL-https://www.debian.org/security/2023/dsa-5498
- URL-https://security.gentoo.org/glsa/202309-05
- URL-https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
- URL-https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/
- URL-https://github.com/webmproject/libwebp/releases/tag/v1.3.2
- URL-https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
- URL-http://www.openwall.com/lists/oss-security/2023/09/21/4
- URL-https://blog.isosceles.com/the-webp-0day/
- URL-http://www.openwall.com/lists/oss-security/2023/09/22/1
- URL-http://www.openwall.com/lists/oss-security/2023/09/22/3
- URL-http://www.openwall.com/lists/oss-security/2023/09/22/4
- URL-http://www.openwall.com/lists/oss-security/2023/09/22/5
- URL-http://www.openwall.com/lists/oss-security/2023/09/22/8
- URL-http://www.openwall.com/lists/oss-security/2023/09/22/7
- URL-http://www.openwall.com/lists/oss-security/2023/09/22/6
- URL-http://www.openwall.com/lists/oss-security/2023/09/26/1
- URL-http://www.openwall.com/lists/oss-security/2023/09/26/7
- URL-http://www.openwall.com/lists/oss-security/2023/09/28/1
- URL-http://www.openwall.com/lists/oss-security/2023/09/28/2
- URL-http://www.openwall.com/lists/oss-security/2023/09/28/4
- URL-https://security.netapp.com/advisory/ntap-20230929-0011/
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/
- URL-https://sethmlarson.dev/security-developer-in-residence-weekly-report-16
- URL-https://www.bentley.com/advisories/be-2023-0001/
- URL-https://security.gentoo.org/glsa/202401-10

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.