Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-3277

Опубликовано: 14 апр. 2025
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

An integer overflow can be triggered in SQLite’s concat_ws() function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

A flaw was found in SQLite’s concat_ws() function, where an integer overflow can be triggered. The resulting truncated integer can allocate a buffer. When SQLite writes the resulting string to the buffer, it uses the original, untruncated size, and a wild heap buffer overflow size of around 4GB can occur. This issue can result in arbitrary code execution.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6sqliteNot affected
Red Hat Enterprise Linux 7sqliteNot affected
Red Hat Enterprise Linux 8mingw-sqliteNot affected
Red Hat Enterprise Linux 8rust-toolset:rhel8/rustNot affected
Red Hat Enterprise Linux 8sqliteNot affected
Red Hat Enterprise Linux 9rustNot affected
Red Hat Enterprise Linux 9sqliteNot affected
Red Hat OpenShift Container Platform 4rhcosWill not fix
Red Hat Enterprise Linux 10sqliteFixedRHSA-2025:751713.05.2025
Red Hat Enterprise Linux 8nodejsFixedRHSA-2025:445905.05.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=2359553SQLite: integer overflow in SQLite

EPSS

Процентиль: 26%
0.00086
Низкий

7.3 High

CVSS3

Связанные уязвимости

ubuntu
2 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

nvd
2 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

debian
2 месяца назад

An integer overflow can be triggered in SQLite\u2019s `concat_ws()` fu ...

github
2 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

oracle-oval
28 дней назад

ELSA-2025-7433: nodejs:22 security update (IMPORTANT)

EPSS

Процентиль: 26%
0.00086
Низкий

7.3 High

CVSS3