An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
References
Link | Resource |
---|---|
https://sqlite.org/src/info/498e3f1cf57f164f | Patch |
Configurations
History
01 Aug 2025, 18:29
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-190 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:* | |
First Time |
Sqlite
Sqlite sqlite |
|
References | () https://sqlite.org/src/info/498e3f1cf57f164f - Patch |
15 Apr 2025, 18:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Apr 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-14 17:15
Updated : 2025-08-01 18:29
NVD link : CVE-2025-3277
Mitre link : CVE-2025-3277
CVE.ORG link : CVE-2025-3277
JSON object : View
Products Affected
sqlite
- sqlite