{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-39928","assignerOrgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","state":"PUBLISHED","assignerShortName":"talos","dateReserved":"2023-08-14T16:33:45.829Z","datePublished":"2023-10-06T15:17:20.078Z","dateUpdated":"2025-11-04T19:17:45.371Z"},"containers":{"cna":{"affected":[{"vendor":"Webkit","product":"Webkit","versions":[{"version":"WebKitGTK 2.40.5","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a malicious webpage to trigger this vulnerability."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-416: Use After Free","type":"CWE","cweId":"CWE-416"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"providerMetadata":{"orgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","shortName":"talos","dateUpdated":"2024-01-31T15:06:39.957Z"},"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831","name":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831"},{"url":"https://webkitgtk.org/security/WSA-2023-0009.html","name":"https://webkitgtk.org/security/WSA-2023-0009.html"},{"url":"https://www.debian.org/security/2023/dsa-5527"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/"},{"url":"https://security.gentoo.org/glsa/202401-33"}],"credits":[{"lang":"en","value":"Discovered by Marcin &#39;Icewall&#39; Noga of Cisco Talos."}]},"adp":[{"title":"CVE Program Container","references":[{"name":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831","tags":["x_transferred"],"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831"},{"name":"https://webkitgtk.org/security/WSA-2023-0009.html","tags":["x_transferred"],"url":"https://webkitgtk.org/security/WSA-2023-0009.html"},{"tags":["x_transferred"],"url":"https://www.debian.org/security/2023/dsa-5527"},{"tags":["x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/"},{"tags":["x_transferred"],"url":"https://security.gentoo.org/glsa/202401-33"},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1831"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T19:17:45.371Z"}}]}}