Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-3277

Опубликовано: 14 апр. 2025
Источник: debian
EPSS Низкий

Описание

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sqlite3fixed3.46.1-3package
sqlite3not-affectedbookwormpackage
sqlite3not-affectedbullseyepackage

Примечания

  • Fixed by: https://sqlite.org/src/info/498e3f1cf57f164f (v3.49.1)

  • Duplicate of CVE-2025-29087

EPSS

Процентиль: 26%
0.00087
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
7 месяцев назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

CVSS3: 7.3
redhat
7 месяцев назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

CVSS3: 9.8
nvd
7 месяцев назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

msrc
2 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

rocky
около 1 месяца назад

Important: sqlite security update

EPSS

Процентиль: 26%
0.00087
Низкий