8.1
CVSSv3

CVE-2018-20346

Published: 21/12/2018 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQLite prior to 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote malicious users to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sqlite sqlite

google chrome

redhat linux 6.0

debian debian linux 8.0

opensuse leap 42.3

opensuse leap 15.0

Vendor Advisories

Several security issues were fixed in SQLite ...
Several security issues were fixed in SQLite ...
Multiple flaws were found in sqlite An attacker having the ability to run arbitrary SQL commands could use this flaw to execute arbitrary code with the permission of the user running the sqlite application ...
SQLite before 3253, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Mag ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-2019-1-22-2 macOS Mojave 10143, Security Update 2019-001 High Sierra, Security Update 2019-001 Sierra <!--X ...
<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-2019-1-24-1 iTunes 1293 for Windows <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Apple Prod ...

Github Repositories

BURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.

Log Requests to SQLite This extension has a single objective: Keep a trace of every HTTP request that has been sent via BURP Why? When I perform an assessment of a web application, it is often spread on several days/weeks and during this assessment, I use the different tools proposed by BURP (Proxy, Repeater, Intruder, Spider, Scanner) to send many HTTP request to the targe

References

CWE-190https://www.sqlite.org/releaselog/3_25_3.htmlhttps://crbug.com/900910https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786ehttps://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=1659677https://bugzilla.redhat.com/show_bug.cgi?id=1659379https://blade.tencent.com/magellan/index_en.htmlhttps://access.redhat.com/articles/3758321https://worthdoingbadly.com/sqlitebug/https://sqlite.org/src/info/d44318f59044162ehttps://sqlite.org/src/info/940f2adc8541a838https://news.ycombinator.com/item?id=18685296https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.htmlhttps://lists.debian.org/debian-lts-announce/2018/12/msg00012.htmlhttps://www.synology.com/security/advisory/Synology_SA_18_61http://www.securityfocus.com/bid/106323https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.aschttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.htmlhttps://security.gentoo.org/glsa/201904-21https://usn.ubuntu.com/4019-1/https://usn.ubuntu.com/4019-2/https://support.apple.com/HT209448https://support.apple.com/HT209447https://support.apple.com/HT209446https://support.apple.com/HT209451https://support.apple.com/HT209443https://support.apple.com/HT209450https://www.oracle.com/security-alerts/cpuapr2020.htmlhttps://lists.debian.org/debian-lts-announce/2020/08/msg00037.htmlhttps://kc.mcafee.com/corporate/index?page=content&id=SB10365https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.htmlhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/https://nvd.nist.govhttps://usn.ubuntu.com/4019-1/