SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/106323 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/articles/3758321 - Third Party Advisory | |
References | () https://blade.tencent.com/magellan/index_en.html - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1659379 - Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1659677 - Issue Tracking, Third Party Advisory | |
References | () https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html - Third Party Advisory | |
References | () https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e - Third Party Advisory | |
References | () https://crbug.com/900910 - Permissions Required, Third Party Advisory | |
References | () https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html - Exploit, Third Party Advisory | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10365 - | |
References | () https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/ - | |
References | () https://news.ycombinator.com/item?id=18685296 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201904-21 - Third Party Advisory | |
References | () https://sqlite.org/src/info/940f2adc8541a838 - Patch, Third Party Advisory | |
References | () https://sqlite.org/src/info/d44318f59044162e - Patch, Third Party Advisory | |
References | () https://support.apple.com/HT209443 - | |
References | () https://support.apple.com/HT209446 - | |
References | () https://support.apple.com/HT209447 - | |
References | () https://support.apple.com/HT209448 - | |
References | () https://support.apple.com/HT209450 - | |
References | () https://support.apple.com/HT209451 - | |
References | () https://usn.ubuntu.com/4019-1/ - | |
References | () https://usn.ubuntu.com/4019-2/ - | |
References | () https://worthdoingbadly.com/sqlitebug/ - Exploit, Third Party Advisory | |
References | () https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc - Third Party Advisory | |
References | () https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html - | |
References | () https://www.oracle.com/security-alerts/cpuapr2020.html - | |
References | () https://www.sqlite.org/releaselog/3_25_3.html - Release Notes, Vendor Advisory | |
References | () https://www.synology.com/security/advisory/Synology_SA_18_61 - Third Party Advisory |
Information
Published : 2018-12-21 21:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20346
Mitre link : CVE-2018-20346
CVE.ORG link : CVE-2018-20346
JSON object : View
Products Affected
- chrome
sqlite
- sqlite
opensuse
- leap
debian
- debian_linux
redhat
- linux
CWE
CWE-190
Integer Overflow or Wraparound