Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-3277

Опубликовано: 14 апр. 2025
Источник: debian
EPSS Низкий

Описание

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sqlite3fixed3.46.1-3package
sqlite3not-affectedbookwormpackage
sqlite3not-affectedbullseyepackage

Примечания

  • Fixed by: https://sqlite.org/src/info/498e3f1cf57f164f (v3.49.1)

  • Duplicate of CVE-2025-29087

EPSS

Процентиль: 26%
0.00086
Низкий

Связанные уязвимости

ubuntu
2 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

CVSS3: 7.3
redhat
2 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

nvd
2 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

github
2 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

oracle-oval
28 дней назад

ELSA-2025-7433: nodejs:22 security update (IMPORTANT)

EPSS

Процентиль: 26%
0.00086
Низкий