Description
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
References (8)
Core 8
Core References
Issue Tracking, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
Issue Tracking, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
Vendor Advisory
https://security.netapp.com/advisory/ntap-20240112-0008/
Third Party Advisory vdb-entry
technical-description
https://vuldb.com/?id.248999
Permissions Required signature
permissions-required
https://vuldb.com/?ctiid.248999
Exploit related
https://sqlite.org/forum/forumpost/5bcbf4571c
Patch patch
https://sqlite.org/src/info/0e4e7a05c4204b47
Scores
CVSS v3
5.5
EPSS
0.0013
EPSS Percentile
31.9%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-119
CWE-122
Status
published
Products (3)
fedoraproject/fedora
38
fedoraproject/fedora
39
sqlite/sqlite
< 3.43.0
Published
Dec 29, 2023
Tracked Since
Feb 18, 2026