Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-3277

Опубликовано: 14 апр. 2025
Источник: debian
EPSS Низкий

Описание

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sqlite3fixed3.46.1-3package
sqlite3not-affectedbookwormpackage
sqlite3not-affectedbullseyepackage

Примечания

  • Fixed by: https://sqlite.org/src/info/498e3f1cf57f164f (v3.49.1)

  • Duplicate of CVE-2025-29087

EPSS

Процентиль: 27%
0.00091
Низкий

Связанные уязвимости

ubuntu
4 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

CVSS3: 7.3
redhat
4 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

nvd
4 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

github
4 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

oracle-oval
около 1 месяца назад

ELSA-2025-7517: sqlite security update (IMPORTANT)

EPSS

Процентиль: 27%
0.00091
Низкий