Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-45346

Опубликовано: 14 фев. 2022
Источник: ubuntu
Приоритет: low
CVSS2: 4
CVSS3: 4.3

Описание

A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-apps/bionic

ignored

vendor disputes CVE
esm-apps/focal

ignored

vendor disputes CVE
esm-apps/jammy

ignored

vendor disputes CVE
esm-apps/xenial

ignored

vendor disputes CVE
esm-infra-legacy/trusty

ignored

vendor disputes CVE
focal

ignored

end of standard support, was ignored [vendor disputes CVE]
impish

ignored

end of life
jammy

ignored

vendor disputes CVE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

ignored

vendor disputes CVE
esm-infra-legacy/trusty

ignored

vendor disputes CVE
esm-infra/bionic

ignored

vendor disputes CVE
esm-infra/focal

ignored

vendor disputes CVE
esm-infra/xenial

ignored

vendor disputes CVE
focal

ignored

end of standard support, was ignored [vendor disputes CVE]
impish

ignored

end of life
jammy

ignored

vendor disputes CVE
kinetic

ignored

end of life, was ignored [vendor disputes CVE]

Показывать по

4 Medium

CVSS2

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
redhat
почти 5 лет назад

A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.

CVSS3: 4.3
nvd
почти 4 года назад

A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.

CVSS3: 4.3
debian
почти 4 года назад

A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 an ...

CVSS3: 6.5
github
почти 4 года назад

A Memory Leak vulnerabilty exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicous user obtain sensitive information..

4 Medium

CVSS2

4.3 Medium

CVSS3