CVE-2023-6351
vulnerability analysis and mitigation

Overview

A high-severity use-after-free vulnerability (CVE-2023-6351) was discovered in libavif component of Google Chrome prior to version 119.0.6045.199. This vulnerability allows remote attackers to potentially exploit heap corruption through a specially crafted AVIF file (NVD, Chrome Blog).

Technical details

The vulnerability is classified as a use-after-free flaw in the libavif library implementation within Chrome. The issue has been assigned a high severity rating by the Chromium security team. The vulnerability could be triggered when processing specially crafted AVIF image files, potentially leading to heap corruption (Chrome Blog).

Impact

If successfully exploited, this vulnerability could allow remote attackers to execute arbitrary code through heap corruption, potentially leading to system compromise. The vulnerability affects Chrome versions prior to 119.0.6045.199 across multiple platforms including Windows, Mac, and Linux (Debian Security, Fedora Update).

Mitigation and workarounds

Users and administrators are strongly advised to upgrade to Chrome version 119.0.6045.199 or later. The vulnerability has been patched in this version. Various Linux distributions have also released security updates to address this vulnerability, including Debian (versions 119.0.6045.199-1~deb11u1 for bullseye and 119.0.6045.199-1~deb12u1 for bookworm) and Fedora (Debian Security, Gentoo Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management