Search for vulnerabilities
Vulnerability details: VCID-2svv-d2xq-aaan
Vulnerability ID VCID-2svv-d2xq-aaan
Aliases CVE-2023-1999
Summary There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free. 
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1999.json
epss 0.00125 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00125 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00125 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00125 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00125 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00125 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00125 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00125 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00143 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00246 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
epss 0.03677 https://api.first.org/data/v1/epss?cve=CVE-2023-1999
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2023-1999
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2023-1999
cvssv3.1 8.8 https://security.gentoo.org/glsa/202309-05
generic_textual HIGH https://security.gentoo.org/glsa/202309-05
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2023-13
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2023-14
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2023-15
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1999.json
https://api.first.org/data/v1/epss?cve=CVE-2023-1999
https://chromium.googlesource.com/webm/libwebp
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://security.gentoo.org/glsa/202309-05
1035371 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035371
2186102 https://bugzilla.redhat.com/show_bug.cgi?id=2186102
cpe:2.3:a:webmproject:libwebp:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webmproject:libwebp:*:*:*:*:*:*:*:*
CVE-2023-1999 https://nvd.nist.gov/vuln/detail/CVE-2023-1999
GLSA-202305-35 https://security.gentoo.org/glsa/202305-35
mfsa2023-13 https://www.mozilla.org/en-US/security/advisories/mfsa2023-13
mfsa2023-14 https://www.mozilla.org/en-US/security/advisories/mfsa2023-14
mfsa2023-15 https://www.mozilla.org/en-US/security/advisories/mfsa2023-15
RHSA-2023:1785 https://access.redhat.com/errata/RHSA-2023:1785
RHSA-2023:1786 https://access.redhat.com/errata/RHSA-2023:1786
RHSA-2023:1787 https://access.redhat.com/errata/RHSA-2023:1787
RHSA-2023:1788 https://access.redhat.com/errata/RHSA-2023:1788
RHSA-2023:1789 https://access.redhat.com/errata/RHSA-2023:1789
RHSA-2023:1790 https://access.redhat.com/errata/RHSA-2023:1790
RHSA-2023:1791 https://access.redhat.com/errata/RHSA-2023:1791
RHSA-2023:1792 https://access.redhat.com/errata/RHSA-2023:1792
RHSA-2023:1802 https://access.redhat.com/errata/RHSA-2023:1802
RHSA-2023:1803 https://access.redhat.com/errata/RHSA-2023:1803
RHSA-2023:1804 https://access.redhat.com/errata/RHSA-2023:1804
RHSA-2023:1805 https://access.redhat.com/errata/RHSA-2023:1805
RHSA-2023:1806 https://access.redhat.com/errata/RHSA-2023:1806
RHSA-2023:1809 https://access.redhat.com/errata/RHSA-2023:1809
RHSA-2023:1810 https://access.redhat.com/errata/RHSA-2023:1810
RHSA-2023:1811 https://access.redhat.com/errata/RHSA-2023:1811
RHSA-2023:2072 https://access.redhat.com/errata/RHSA-2023:2072
RHSA-2023:2073 https://access.redhat.com/errata/RHSA-2023:2073
RHSA-2023:2075 https://access.redhat.com/errata/RHSA-2023:2075
RHSA-2023:2076 https://access.redhat.com/errata/RHSA-2023:2076
RHSA-2023:2077 https://access.redhat.com/errata/RHSA-2023:2077
RHSA-2023:2078 https://access.redhat.com/errata/RHSA-2023:2078
RHSA-2023:2084 https://access.redhat.com/errata/RHSA-2023:2084
RHSA-2023:2085 https://access.redhat.com/errata/RHSA-2023:2085
USN-6078-1 https://usn.ubuntu.com/6078-1/
USN-6078-2 https://usn.ubuntu.com/6078-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1999.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-1999
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-1999
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://security.gentoo.org/glsa/202309-05
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.48107
EPSS Score 0.00125
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.