By Ofri Ouzan & Yotam Perkal, Rezilion Security Research
On September 27th, 2023 Google released an update including 10 security fixes. Notably, one of these fixes, identified as CVE-2023-5217, was highlighted for having an existing exploit in the wild. On October 2nd, 2023, CISA added this vulnerability to their KEV Catalog, signifying that it is being actively exploited in the wild. While the likelihood of exploitation isn’t clear yet, this classification makes the vulnerability an urgent concern that requires immediate attention.
CVE-2023-5217 is classified as a heap buffer overflow vulnerability with a high CVSS score of 8.8. This particular vulnerability allows remote attackers to execute heap corruption through the use of a crafted HTML page. Similarly to CVE-2023-4863 Initially, this vulnerability was associated with Chrome. However, further investigation revealed that it resides in the libvpx
library of the WebM VP8/VP9 Codec SDK.
If this sounds familiar, you’re absolutely right!
It bears a striking resemblance to our recent research on CVE-2023-4863 released less than two weeks ago. These two vulnerabilities share numerous similarities:
Rezilion analysis reveals that there are several common Linux applications that contain or use the vulnerable libvpx
package as a dependency. Examples include: gstreamer1-plugins-good, gstreamer-plugins-bad-free, ffmpeg-libs, libgd3
, Microsoft vcpkg,
Telegram and Telegram Desktop, FFmpeg, SmartTubeLegacy, Openai Retro, Google ExoPlayer, Natron.
While libvpx
seems to be less widespread than libwebp, Rezilion has also identified the vulnerable library in several container images’ latest versions, collectively downloaded and deployed over 100 million times such as elixir
, erlang, silverpeas, gazebo, ros, and nuxeo.
This is a heap buffer overflow vulnerability in the libvpx package of WebM VP8/VP9 Codec SDK. Heap is a data structure that stores data of a running program, the data is stored in a variable amount that won’t be known until the program is running.
Heap buffer overflow occurs when data is written beyond the allocated boundaries of a program’s memory heap, potentially leading to a denial of service or remote code execution
The libvpx
package of WebM VP8/VP9 Codec SDK is a free software video codec library from Google and the Alliance for Open Media (AOMedia). It serves as the reference software implementation for the VP8 and VP9 video coding formats.
While the vulnerability initially seems to target Chromium-based applications, it then realized to target every application relying on the ubiquitous libvpx
package of WebM VP8/VP9 Codec SDK. There are multiple applications, software, libraries, and containers relying on this package making the attack surface wider than just Google Chrome.
Organizations with SBOM (Software Bill of Materials) solutions in their environment are advised to query the SBOM for any package using a vulnerable version of libvpx as a dependency. It is especially important to make sure that the system libvpx
library is patched as several applications such as Chromium for example, are built against the system libvpx
library.
A list of packages that depend on the “libvpx” package according to Arch Linux:
avidemux-cli, ffmpeg (requires libvpx.so), ffmpeg4.4 (requires libvpx.so), gst-plugins-good, handbrake, handbrake-cli, lib32-libvpx, mencoder, mplayer, qt5-webengine, qt6-webengine, qt6-webengine, shotcut, thunderbird, toxcore, virtualbox, xpra, av1an (optional), baresip (optional), vlc (optional), avidemux (make), baresip (make), gstreamer (make), handbrake (make), mplayer (make), ovenmediaengine (make), virtualbox (make), vlc (make)
The vulnerability was fixed in libvpx version 1.13.1 and in chrome version 117.0.5938.132.
We’d also like to draw attention to CVE-2023-44488, another libvpx
vulnerability that was listed in the NVD on September 30, 2023. As can be seen in the below image, version 1.13.1 of libvpx
contains two separate security-related fixes. The first is CVE-2023-5217 affecting VP8, while the second is CVE-2023-44488 affecting VP.
As explained in the below tweet, while its severity is yet to be known, since CVE-2023-44488 has not yet received a CVSS score or a CPE identifier, vulnerability scanners will currently not be able to identify it.
Since Google revealed there is an existing exploit in the wild for CVE-2023-5217, it is imperative to swiftly apply the provided patches to your systems. These patches have been specifically designed to address this critical vulnerability and should be deployed without delay.
Since libvpx
is a dependency of multiple software products, it is advised to query your SBOM solution or asset inventory system for specific occurrences of libvpx in all of its vulnerable variations.
For software, applications, or packages that dynamically incorporate the libvpx
package into their code, updating the system libvpx
library to the latest version is crucial. After the update, it is advisable to restart these applications to ensure the changes take effect.
While safeguarding your systems is paramount, it’s essential to balance security with operational stability. When applying updates, be mindful of potential operational risks that could disrupt normal functioning. Plan and execute the update process carefully to minimize any adverse effects.
__________________________________
To help organizations work around potential blindspots in their ability to detect all instances of CVE-2023-5217 within their environment, Rezilion is now offering a free risk assessment program.
Through this opportunity, organizations can access Rezilion’s inherent Dynamic SBOM capability to simply query the dependency tree of any environment in which Rezilion is deployed to instantly identify instances of software components using vulnerable libvpx versions as a dependency.
For example, in this screenshot from the Rezilion platform, on the right-hand side, you can see examples of various components that are dependent on vulnerable versions of libvpx
, including whether these components are actually in use (loaded to memory) or not:
No code, no agents, and no formal commitment is required to participate in the free risk assessment. Benefits of the program include:
To learn more about the free risk assessment program, visit https://info.rezilion.com/lp/cve-2023-5217-risk-assessment.
The post The CVE-2023-5217 Deja Vu – Another Actively Exploited Chrome Vulnerability Affecting a WebM Project Library (libvpx) appeared first on Rezilion.
*** This is a Security Bloggers Network syndicated blog from Rezilion authored by rezilion. Read the original post at: https://www.rezilion.com/blog/the-cve-2023-5217-deja-vu-another-actively-exploited-chrome-vulnerability-affecting-a-webm-project-library-libvpx/