跳转到帖子

Fortinet FortiClientEMS: CVE-2023-4863 - Heap overflow in Chrome/libwebp (CVE-2023-4863)

recommended_posts

发布于
  • Members

Fortinet FortiClientEMS: CVE-2023-4863 - Heap overflow in Chrome/libwebp (CVE-2023-4863)

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
01/14/2025
Created
01/16/2025
Added
01/15/2025
Modified
01/15/2025

Description

Fortinet Product Security team has evaluated the impact of the vulnerablity affecting Google Chrome library listed below:CVE-2023-4863: severity HIGHHeap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.https://nvd.nist.gov/vuln/detail/CVE-2023-4863FortiClient and FortiClientEMS applications have embedded Chrome browser (for SAML authentication and administrative console application.)FortiSOAR is using Chrome to render reports on the backend.Libwepb is the library which renders ".webp" images into chrome browser.When a malicious image is displayed in chrome (with data overflow), program execution might be modified by the attacker. The attacker will need to escape google chrome sandboxing environment to perform additional damages.

Solution(s)

  • fortinet-forticlientems-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2023-4863
  • CVE - 2023-4863
  • https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863
  • https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-4863
  • https://www.fortiguard.com/psirt/FG-IR-23-381
  • 查看数 702
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…