Any Chromium and Firefox browser prior to version 116 will be vulnerable to this, update your browsers.

  • Buelldozer@lemmy.today
    link
    fedilink
    English
    arrow-up
    82
    ·
    9 months ago

    This is way way wider than just browsers. Anything that can display webp images is vulnerable and that includes things like MS Teams and Twitch.

    • Bipta@kbin.social
      link
      fedilink
      arrow-up
      14
      arrow-down
      1
      ·
      9 months ago

      As far as I'm aware this does affect Android and is not currently fixed. It's expected to be fixed in the October security patch.

      This is just my memory of reading weeks ago. Someone else may know better.

      • 9point6@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        1
        ·
        9 months ago

        The Android webview is updated through the play store as of a few years ago

        • Bipta@kbin.social
          link
          fedilink
          arrow-up
          3
          ·
          9 months ago

          I believe the libwebp is implemented at the OS level. Again someone else may know better.

      • TakingOnWater@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 months ago

        So if the phone gets a security update for this at the OS level, should we theoretically be safe to use apps with any sort of browser functionality? Like some apps that don't update, or are no longer being maintained, etc

    • GamingChairModel@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      9 months ago

      This isn't just a browser vulnerability. It's a vulnerability at a much more fundamental level, which is why it's so critical. It's a vulnerability in how almost every piece of software processes a widely supported image format, so anything that touches images is potentially at risk: browsers, chat or messaging apps, file browsers, or really anything that uses thumbnails or image previews, including some core OS functionality. On the server side, you've got anything that makes thumbnails and previews, too.

      We should wait and see whether there are any practical attacks outside the browser context (maybe the malicious code needs to be placed in a web page that displays the malicious image file, or maybe they need to figure out a way to actually put all the malicious code in the image file itself). But the vulnerability itself is in a fundamental library used by a lot more software.

  • cheese_greater@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    1
    ·
    9 months ago

    What actual like platforms does this affect and to what extent tho? Like Mac (probably not iOS which is WebKit)?

    • Th3D3k0y@lemmy.world
      link
      fedilink
      English
      arrow-up
      13
      ·
      9 months ago

      Current Description

      Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

      • cheese_greater@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        9 months ago

        By crafter webpage, does it mean it refers to anything like phishing or something a more savvy user wouldn't likely "fall for" or does that actually not matter (zero-day or whatever)

      • cheese_greater@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 months ago

        I wonder if it applies to devices using LockDown mode, thats shuts down a lot of nonsense in its own right…

        • towerful@programming.dev
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          9 months ago

          https://www.techtarget.com/searchsecurity/news/366551978/Browser-companies-patch-critical-zero-day-vulnerability

          Citizen Lab said Blastpass was discovered on the device of an employee with "a Washington DC-based civil society organization" and that it could be mitigated by Apple's Lockdown Mode. An investigation into the exploit chain continues, but researchers said it involved "PassKit attachments containing malicious images sent from an attacker iMessage account to the victim."

          Edit:

          Fuck my reading skill (or fuck articles listing multiple high profile CVEs)…
          Blastpass is not the same libwebp CVE (blastpass, the iMessage thing, is CVE-2023-41064. libwebp is CVE-2023-4863 - although that is the chrome one, despite this affecting libwebp not chrome).

          I think the whole situation is very rapidly being researched and it's all developing.
          So, no idea if lockdown mode would have any effect

    • Phen@lemmy.eco.br
      link
      fedilink
      English
      arrow-up
      3
      ·
      9 months ago

      Discord, slack, MS Teams, Steam, pretty much anything. But most of them have already fixed it so if you let stuff update itself frequently, there's little risk.

    • GamingChairModel@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      9 months ago

      Apple also released urgent out-of-band security patches for iOS and MacOS around the same time, and disclosed that it had something to o do with imag processing. Unclear whether they use libwebp or some other implementation, but they disclosed that it was being actively exploited on iPhones.

  • Vub@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    9 months ago

    Not sure why you only mention Chromium and Firefox in the post text, I can only assume this vulnerability affects ALL browsers. Safari (WebKit based) is, as far as I know, the second most used browser in the world.

    • dwokimmortalus@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      9 months ago

      It's anything implementing .webp support. Though the CVE has been out for nearly two weeks already so most apps have been patched.

      • Marius@lemmy.mariusdavid.fr
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 months ago

        Actually, it’s specific to libwebp, but many things that decode webp just use this library (for example, decoding webp with the "image" rust crates doesn’t use libwebp. It does use it for encoding thought).

      • Turun@feddit.de
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        9 months ago

        No, how could I be mad about the truth? We'd download and run any dotfiles if the screenshot looks nice enough.

  • nostradiel@lemmy.world
    cake
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    15
    ·
    edit-2
    9 months ago

    I found these alerts so hilarious… You have no idea how many vulnerabilities are discovered by grey/blackhat hackers. Even whitehat working for the governments or contractors not reporting it to have more variety of back doors.

    But ok… Update and "be" protected. 🤣

    • CriticalMiss@lemmy.world
      link
      fedilink
      English
      arrow-up
      33
      arrow-down
      1
      ·
      9 months ago

      Yes but this is a vulnerability now open to the public that script kiddies are going to utilize so unless you want your data grabbed by a 14yo larper for opening an image in your browser update your browser

      • bobman@unilem.org
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        13
        ·
        9 months ago

        Why are script kiddies always, kids?

        Not a single child I knew growing up knew how to program.

        • StinkyRedMan@lemmy.world
          link
          fedilink
          English
          arrow-up
          9
          arrow-down
          1
          ·
          edit-2
          9 months ago

          That's the point, script kiddies refers to young peoples with low to no technical knowledge using tools made by other peoples.

          • bobman@unilem.org
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            11
            ·
            9 months ago

            But that's why it's misleading.

            Most of the people writing these scripts to exploit known vulnerabilities are not young. It's just an insult to people who write scripts.

            • kevinBLT@lemmy.world
              link
              fedilink
              English
              arrow-up
              11
              arrow-down
              1
              ·
              9 months ago

              The skiddies are the ones using the scripts, not the ones writing them…

              • bobman@unilem.org
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                12
                ·
                edit-2
                9 months ago

                Right. Using/writing, my point still stands that most of them are not kids. It's just an insult because it doesn't require much effort, but has nothing to do with youth.

                Nice ellipses, though. Makes me know you're not really worth listening to.

                • kevinBLT@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  1
                  ·
                  edit-2
                  9 months ago

                  Your "point" isn't one, the fact that you don't seem to comprehend that makes me sure you have brain problems.

          • bobman@unilem.org
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            9 months ago

            That's the thing. It's a comment on maturity, not literal age.

    • CrayonRosary@lemmy.world
      link
      fedilink
      English
      arrow-up
      34
      arrow-down
      1
      ·
      9 months ago

      How is this clickbait? The all-caps is a bit much, but the title contains everything you need to know. There's nothing remotely clickbaity about it.

        • BorgDrone@lemmy.one
          link
          fedilink
          English
          arrow-up
          0
          arrow-down
          2
          ·
          edit-2
          9 months ago

          I just wanted to seem a bit urgent.

          It was kinda urgent two and a half weeks ago when this was first published. Now, not so much,

          • VitabytesDev@feddit.nlOP
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            2
            ·
            9 months ago

            Two and a half weeks ago? I learned about it yesterday. Sorry for bothering you then.