Exploited
8.8
CWE
119 787 22
EPSS
29.610%
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx

First published: Mon Sep 25 2023(Updated: )

<p>This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see <a href="https://chromereleases.googleblog.com/2023">Google Chrome Releases</a> for more information.</p> <p>Google is aware that an exploit for CVE-2023-5217 exists in the wild.</p>

Credit: Clément Lecigne Google's Threat Analysis Group chrome-cve-admin@google.com chrome-cve-admin@google.com chrome-cve-admin@google.com

Affected SoftwareAffected VersionHow to fix
debian/libvpx<=1.9.0-1<=1.12.0-1
1.12.0-1.1
1.9.0-1+deb11u1
1.12.0-1+deb12u1
redhat/chromium-browser<117.0.5938.132
117.0.5938.132
Microsoft Edge (Chromium-based)
npm/electron>=27.0.0-alpha.1<27.0.0-beta.8
27.0.0-beta.8
npm/electron>=26.0.0<26.2.4
26.2.4
npm/electron>=25.0.0<25.8.4
25.8.4
npm/electron>=24.0.0<24.8.5
24.8.5
npm/electron<22.3.25
22.3.25
Microsoft Edge<117.0.2045.47
WebM Project libvpx
Google Chrome<117.0.5938.132
117.0.5938.132
webmproject libvpx=1.13.1
Google Chrome<117.0.5938.132
Mozilla Firefox<118.0.1
Mozilla Firefox<118.1
Mozilla Firefox ESR<115.3.1
Mozilla Firefox Focus<118.1
Microsoft Teams
Microsoft Teams
debian/chromium
120.0.6099.224-1~deb11u1
131.0.6778.139-1~deb12u1
133.0.6943.98-1~deb12u1
133.0.6943.98-1
debian/firefox<=135.0.1-1
debian/firefox-esr<=128.5.0esr-1~deb12u1<=128.7.0esr-1~deb12u1<=128.7.0esr-1
115.14.0esr-1~deb11u1
128.7.0esr-1~deb11u1
debian/libvpx
1.9.0-1+deb11u3
1.12.0-1+deb12u3
1.15.0-1
debian/thunderbird
1:115.12.0-1~deb11u1
1:128.7.0esr-1~deb11u1
1:128.5.0esr-1~deb12u1
1:128.7.0esr-1~deb12u1
1:128.6.0esr-1
Mozilla Firefox<118.0.1
118.0.1
Mozilla Firefox ESR<115.3.1
115.3.1
All of
Mozilla Firefox Focus=118.1
Android
All of
Mozilla Firefox=118.1
Android
Mozilla Thunderbird<115.3.1
115.3.1
Apple iOS, iPadOS, and watchOS<16.7.1
16.7.1
Apple iOS, iPadOS, and watchOS<16.7.1
16.7.1
Apple iOS, iPadOS, and watchOS<17.0.3
17.0.3
Apple iOS, iPadOS, and watchOS<17.0.3
17.0.3
webmproject libvpx<1.13.1
Microsoft Edge=116.0.1938.98
Microsoft Edge=117.0.2045.47
Microsoft Edge Chromium=116.0.5845.229
Microsoft Edge Chromium=117.0.5938.132
Mozilla Firefox<115.3.1
Mozilla Firefox<118.0.1
Mozilla Firefox<118.1
Mozilla Thunderbird<115.3.1
Fedoraproject Fedora=37
Fedoraproject Fedora=38
Fedoraproject Fedora=39
Debian GNU/Linux=10.0
Debian GNU/Linux=11.0
Debian GNU/Linux=12.0
iPadOS>=17.0<17.0.3
iPadOS=16.7
iOS>=17.0<17.0.3
iOS=16.7
Google Chrome<117.0.5938.132
Red Hat Enterprise Linux=9.0

Remedy

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2023-5217?

    CVE-2023-5217 is a heap buffer overflow vulnerability in the vp8 encoding in libvpx in Google Chrome and Microsoft Edge (Chromium-based) that allows a remote attacker to potentially exploit heap corruption.

  • How severe is CVE-2023-5217?

    CVE-2023-5217 has a severity rating of High.

  • Which software products are affected by CVE-2023-5217?

    CVE-2023-5217 affects Google Chrome, Microsoft Edge (Chromium-based), and libvpx.

  • How can I fix CVE-2023-5217 in Microsoft Edge?

    To fix CVE-2023-5217 in Microsoft Edge, update to version 117.0.5938.132 or later.

  • How can I fix CVE-2023-5217 in Google Chrome?

    To fix CVE-2023-5217 in Google Chrome, update to version 117.0.5938.132 or later.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203