Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3416

Опубликовано: 24 апр. 2015
Источник: debian

Описание

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sqlite3fixed3.8.9-1package
sqlite3not-affectedsqueezepackage
sqliteremovedpackage
sqlitenot-affectedbusterpackage

Примечания

  • http://www.sqlite.org/src/info/c494171f77dc2e5e

  • http://seclists.org/bugtraq/2015/Apr/97

  • https://lists.debian.org/debian-lts/2015/06/msg00031.html

  • width/precision limit safeguards are present in sqlite (V2), refactoring in V3 made it vulnerable.

Связанные уязвимости

ubuntu
больше 10 лет назад

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

redhat
больше 10 лет назад

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

nvd
больше 10 лет назад

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

github
больше 3 лет назад

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

oracle-oval
около 10 лет назад

ELSA-2015-1634: sqlite security update (MODERATE)