Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-3277

Опубликовано: 14 апр. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий

Описание

An integer overflow can be triggered in SQLite’s concat_ws() function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

code not present
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
noble

DNE

oracular

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

3.46.1-3
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
noble

released

3.45.1-1ubuntu2.3
oracular

released

3.46.1-1ubuntu0.2
plucky

not-affected

3.46.1-3

Показывать по

EPSS

Процентиль: 26%
0.00086
Низкий

Связанные уязвимости

CVSS3: 7.3
redhat
2 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

nvd
2 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

debian
2 месяца назад

An integer overflow can be triggered in SQLite\u2019s `concat_ws()` fu ...

github
2 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

oracle-oval
28 дней назад

ELSA-2025-7433: nodejs:22 security update (IMPORTANT)

EPSS

Процентиль: 26%
0.00086
Низкий