使用libwebp(低于1.3.2版本)处理WebP格式图像的框架、软硬件产品(服务)和信息系统。
目前,已知受该漏洞影响的产品和框架包括:
Google Chrome for Mac/Linux < 116.0.5845.187
Google Chrome for Windows < 116.0.5845.187/.188
Mozilla Firefox < 117.0.1
Microsoft Edge < 109.0.1518.140, 116.0.1938.81, 117.0.2045.31
Electron < 22.3.24, 24.8.3, 25.8.1, 26.2.1, 27.0.0-beta.2
https://storage.googleapis.com/downloads.webmproject.org/releases/webp/index.html
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863
https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
https://github.com/electron/electron/pull/39828
https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/
https://support.apple.com/en-us/HT213905
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
https://www.accessnow.org/publication/hacking-meduza-pegasus-spyware-used-to-target-putins-critic/
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
https://stackdiary.com/heap-buffer-overflow-in-libwebp-cve-2023-5129/
https://chromium.googlesource.com/webm/libwebp/+/2af26267cdfcb63a88e5c74a85927a12d6ca1d76
https://chromium.googlesource.com/webm/libwebp/+/902bc9190331343b2017211debcec8d2ab87e17a