Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-3277

Опубликовано: 14 апр. 2025
Источник: redhat
CVSS3: 7.3

Описание

An integer overflow can be triggered in SQLite’s concat_ws() function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

A flaw was found in SQLite’s concat_ws() function, where an integer overflow can be triggered. The resulting truncated integer can allocate a buffer. When SQLite writes the resulting string to the buffer, it uses the original, untruncated size, and a wild heap buffer overflow size of around 4GB can occur. This issue can result in arbitrary code execution.

Отчет

For Openshift, the bundled sqlite3.c does contain the affected concat_ws function, it is not included in the Rust bindings of the libsqlite3-sys crate, nor are there any indirect ways to call it. Therefore, this is dead code in this context, and Openshift is not affected.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6sqliteNot affected
Red Hat Enterprise Linux 7sqliteNot affected
Red Hat Enterprise Linux 8mingw-sqliteNot affected
Red Hat Enterprise Linux 8rust-toolset:rhel8/rustNot affected
Red Hat Enterprise Linux 8sqliteNot affected
Red Hat Enterprise Linux 9rustNot affected
Red Hat Enterprise Linux 9sqliteNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected
Red Hat Enterprise Linux 10sqliteFixedRHSA-2025:751713.05.2025
Red Hat Enterprise Linux 8nodejsFixedRHSA-2025:445905.05.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=2359553SQLite: integer overflow in SQLite

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
7 месяцев назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

CVSS3: 9.8
nvd
7 месяцев назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

CVSS3: 9.8
debian
7 месяцев назад

An integer overflow can be triggered in SQLite\u2019s `concat_ws()` fu ...

rocky
около 1 месяца назад

Important: sqlite security update

CVSS3: 9.8
github
7 месяцев назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

7.3 High

CVSS3