Miggo Logo

CVE-2023-4863: libwebp: OOB write in BuildHuffmanTable

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.99877%
Published
9/12/2023
Updated
1/8/2024
KEV Status
Yes
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
libwebp-sys2rust< 0.1.80.1.8
libwebp-sysrust< 0.9.30.9.3
electronnpm>= 22.0.0, < 22.3.2422.3.24
electronnpm>= 24.0.0, < 24.8.324.8.3
electronnpm>= 25.0.0, < 25.8.125.8.1
electronnpm>= 26.0.0, < 26.2.126.2.1
electronnpm>= 27.0.0-beta.1, < 27.0.0-beta.227.0.0-beta.2
SkiaSharpnuget>= 2.0.0, < 2.88.62.88.6
github.com/chai2010/webpgo>= 1.0.0
Pillowpip< 10.0.110.0.1
webprust< 0.2.60.2.6
magick.net-q16-anycpunuget< 13.3.013.3.0
magick.net-q16-hdri-anycpunuget< 13.3.013.3.0
magick.net-q16-x64nuget< 13.3.013.3.0
magick.net-q8-anycpunuget< 13.3.013.3.0
magick.net-q8-openmp-x64nuget< 13.3.013.3.0
magick.net-q8-x64nuget< 13.3.013.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The GitHub commit 902bc91 explicitly shows fixes in BuildHuffmanTable related to Huffman table size validation and memory allocation. Multiple vendor advisories (Chromium, Mozilla, Pillow) reference libwebp's BuildHuffmanTable as the root cause. The CVE description specifically mentions the overflow occurs during Huffman table construction. The vulnerability manifests when processing malicious WebP images that trigger invalid Huffman table allocations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

***p *u***r ov*r*low in li*w**p *llow * r*mot* *tt**k*r to p*r*orm *n out o* *oun*s m*mory writ* vi* * *r**t** *TML p***.

Reasoning

T** *it*u* *ommit ******* *xpli*itly s*ows *ix*s in *uil**u**m*nT**l* r*l*t** to *u**m*n t**l* siz* v*li**tion *n* m*mory *llo**tion. Multipl* v*n*or **visori*s (**romium, Mozill*, Pillow) r***r*n** li*w**p's *uil**u**m*nT**l* *s t** root **us*. T**