Описание
Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some PHP installations use a bundled version of sqlite without this vulnerability. The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API.
| Релиз | Статус | Примечание | 
|---|---|---|
| dapper | released  | 5.1.2-1ubuntu3.9 | 
| devel | not-affected  | |
| edgy | released  | 5.1.6-1ubuntu2.6 | 
| feisty | released  | 5.2.1-0ubuntu1.4 | 
| upstream | released  | 5.2.2 | 
Показывать по
| Релиз | Статус | Примечание | 
|---|---|---|
| dapper | ignored  | end of life | 
| devel | released  | 2.8.17-2.1build1 | 
| edgy | ignored  | end of life | 
| feisty | ignored  | end of life | 
| upstream | needs-triage  | 
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some PHP installations use a bundled version of sqlite without this vulnerability. The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API.
Buffer overflow in the sqlite_decode_binary function in src/encode.c i ...
Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some PHP installations use a bundled version of sqlite without this vulnerability. The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API.
EPSS
7.5 High
CVSS2