Exploited
8.8
CWE
119 787 22
EPSS
29.610%
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx

First published: Mon Sep 25 2023(Updated: )

<p>This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see <a href="https://chromereleases.googleblog.com/2023">Google Chrome Releases</a> for more information.</p> <p>Google is aware that an exploit for CVE-2023-5217 exists in the wild.</p>

Credit: Clément Lecigne Google's Threat Analysis Group chrome-cve-admin@google.com chrome-cve-admin@google.com chrome-cve-admin@google.com

Affected SoftwareAffected VersionHow to fix
debian/libvpx<=1.9.0-1<=1.12.0-1
1.12.0-1.1
1.9.0-1+deb11u1
1.12.0-1+deb12u1
redhat/chromium-browser<117.0.5938.132
117.0.5938.132
npm/electron>=27.0.0-alpha.1<27.0.0-beta.8
27.0.0-beta.8
npm/electron>=26.0.0<26.2.4
26.2.4
npm/electron>=25.0.0<25.8.4
25.8.4
npm/electron>=24.0.0<24.8.5
24.8.5
npm/electron<22.3.25
22.3.25
Microsoft Edge
Microsoft Edge Beta<117.0.2045.47
Microsoft Teams
Microsoft Teams
libvpx
Firefox<118.0.1
118.0.1
Firefox ESR<115.3.1
115.3.1
All of
Mozilla Focus=118.1
Android
All of
Firefox=118.1
Android
Thunderbird<115.3.1
115.3.1
Google Chrome (Trace Event)<117.0.5938.132
117.0.5938.132
libvpx=1.13.1
Google Chrome (Trace Event)<117.0.5938.132
Firefox<118.0.1
Firefox<118.1
Firefox ESR<115.3.1
Mozilla Focus<118.1
libvpx<1.13.1
Microsoft Edge Beta=116.0.1938.98
Microsoft Edge Beta=117.0.2045.47
Microsoft Edge=116.0.5845.229
Microsoft Edge=117.0.5938.132
Firefox<115.3.1
Firefox<118.0.1
Firefox<118.1
Thunderbird<115.3.1
Red Hat Fedora=37
Red Hat Fedora=38
Red Hat Fedora=39
Debian Linux=10.0
Debian Linux=11.0
Debian Linux=12.0
iPadOS>=17.0<17.0.3
iPadOS=16.7
iPhone OS>=17.0<17.0.3
iPhone OS=16.7
Google Chrome<117.0.5938.132
Red Hat Enterprise Linux=9.0
Apple iOS and iPadOS<16.7.1
16.7.1
Apple iOS, iPadOS, and macOS<16.7.1
16.7.1
Apple iOS and iPadOS<17.0.3
17.0.3
Apple iOS, iPadOS, and macOS<17.0.3
17.0.3
debian/chromium
120.0.6099.224-1~deb11u1
134.0.6998.35-1~deb12u1
134.0.6998.117-1~deb12u1
134.0.6998.117-1
debian/firefox<=136.0.3-1
debian/firefox-esr<=128.8.0esr-1~deb12u1<=128.8.0esr-1
115.14.0esr-1~deb11u1
128.8.0esr-1~deb11u1
debian/libvpx
1.9.0-1+deb11u3
1.12.0-1+deb12u3
1.15.0-2
debian/thunderbird
1:115.12.0-1~deb11u1
1:128.8.0esr-1~deb11u1
1:128.8.0esr-1~deb12u1
1:128.8.0esr-1

Remedy

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2023-5217?

    CVE-2023-5217 is a heap buffer overflow vulnerability in the vp8 encoding in libvpx in Google Chrome and Microsoft Edge (Chromium-based) that allows a remote attacker to potentially exploit heap corruption.

  • How severe is CVE-2023-5217?

    CVE-2023-5217 has a severity rating of High.

  • Which software products are affected by CVE-2023-5217?

    CVE-2023-5217 affects Google Chrome, Microsoft Edge (Chromium-based), and libvpx.

  • How can I fix CVE-2023-5217 in Microsoft Edge?

    To fix CVE-2023-5217 in Microsoft Edge, update to version 117.0.5938.132 or later.

  • How can I fix CVE-2023-5217 in Google Chrome?

    To fix CVE-2023-5217 in Google Chrome, update to version 117.0.5938.132 or later.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203