Security News > 2023 > September > Video Encoding Library Leaves Chrome, Firefox and More Open to Zero-Day Attack
Google and Mozilla have patched a zero-day exploit in Chrome and Firefox, respectively.
The zero-day exploit could leave users open to a heap buffer overflow, through which attackers could inject malicious code.
If you use Chrome, update to 117.0.5938.132 when it becomes available; Google Chrome says it may take "Days/weeks" for all users to see the update.
The zero-day exploit is technically a heap buffer overflow in VP8 encoding in libvpx, which is a video code library developed by Google and the Alliance for Open Media.
"A commercial surveillance vendor" was actively using the exploit, researcher Maddie Stone of Google's Threat Analysis Group noted on X. There is not a lot more information available about the zero-day exploit at this time.
"Google is aware that an exploit for CVE-2023-5217 exists in the wild," the company wrote in the Chrome release update.
News URL
https://www.techrepublic.com/article/google-zero-day-firefox-others/
Related news
- Mozilla fixes Firefox zero-day actively exploited in attacks (source)
- Firefox Zero-Day Under Attack: Update Your Browser Immediately (source)
- Rackspace monitoring data stolen in ScienceLogic zero-day attack (source)
- Qualcomm patches high-severity zero-day exploited in attacks (source)
- Ivanti warns of three more CSA zero-days exploited in attacks (source)
- Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680) (source)
- CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack (source)
- Fortinet warns of new critical FortiManager flaw used in zero-day attacks (source)
- Lazarus hackers used fake DeFi game to exploit Google Chrome zero-day (source)
- Fortinet FortiManager flaw exploited in zero-day attacks (CVE-2024-47575) (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-09-28 | CVE-2023-5217 | Out-of-bounds Write vulnerability in multiple products Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |