Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3416

Опубликовано: 24 апр. 2015
Источник: debian
EPSS Низкий

Описание

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sqlite3fixed3.8.9-1package
sqlite3not-affectedsqueezepackage
sqliteremovedpackage
sqlitenot-affectedbusterpackage

Примечания

  • http://www.sqlite.org/src/info/c494171f77dc2e5e

  • http://seclists.org/bugtraq/2015/Apr/97

  • https://lists.debian.org/debian-lts/2015/06/msg00031.html

  • width/precision limit safeguards are present in sqlite (V2), refactoring in V3 made it vulnerable.

EPSS

Процентиль: 90%
0.05572
Низкий

Связанные уязвимости

ubuntu
около 10 лет назад

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

redhat
около 10 лет назад

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

nvd
около 10 лет назад

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

github
около 3 лет назад

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

oracle-oval
почти 10 лет назад

ELSA-2015-1634: sqlite security update (MODERATE)

EPSS

Процентиль: 90%
0.05572
Низкий