CVE-2025-3277

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*

History

01 Aug 2025, 18:29

Type Values Removed Values Added
CWE CWE-190
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
First Time Sqlite
Sqlite sqlite
References () https://sqlite.org/src/info/498e3f1cf57f164f - () https://sqlite.org/src/info/498e3f1cf57f164f - Patch

15 Apr 2025, 18:39

Type Values Removed Values Added
Summary
  • (es) Se puede activar un desbordamiento de entero en la función `concat_ws()` de SQLite. El entero truncado resultante se utiliza para asignar un búfer. Cuando SQLite escribe la cadena resultante en el búfer, utiliza el tamaño original sin truncar, lo que puede provocar un desbordamiento descontrolado del búfer de montón de aproximadamente 4 GB. Esto puede provocar la ejecución de código arbitrario.

14 Apr 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-14 17:15

Updated : 2025-08-01 18:29


NVD link : CVE-2025-3277

Mitre link : CVE-2025-3277

CVE.ORG link : CVE-2025-3277


JSON object : View

Products Affected

sqlite

  • sqlite
CWE
CWE-122

Heap-based Buffer Overflow

CWE-190

Integer Overflow or Wraparound