fkie_cve-2020-13434
Vulnerability from fkie_nvd
Published
2020-05-24 22:15
Modified
2024-11-21 05:01
Severity ?
Summary
SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", matchCriteriaId: "2AC3C207-F607-4B3C-AAAF-76190CB0839A", versionEndIncluding: "3.32.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", matchCriteriaId: "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", matchCriteriaId: "A31C8344-3E02-4EB8-8BD8-4C84B7959624", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", matchCriteriaId: "902B8056-9E37-443B-8905-8AA93E2447FB", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", matchCriteriaId: "A6CE5122-6C9D-46AD-BC1D-DD6B2F0690A7", versionEndExcluding: "11.4", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:11.4:-:*:*:*:*:*:*", matchCriteriaId: "4A865EA1-01D7-4E5A-9D13-80780F8A9D7A", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:11.4:p1:*:*:*:*:*:*", matchCriteriaId: "9FCA6A72-2A72-45FD-A43D-B5BF7C329121", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*", matchCriteriaId: "826B53C2-517F-4FC6-92E8-E7FCB24F91B4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*", matchCriteriaId: "93F10A46-AEF2-4FDD-92D6-0CF07B70F986", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p10:*:*:*:*:*:*", matchCriteriaId: "8C7B8FCA-2170-469A-B6D6-2C6AB254F20F", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p11:*:*:*:*:*:*", matchCriteriaId: "E94067A1-5C68-4401-A7B6-29B4FE553733", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p12:*:*:*:*:*:*", matchCriteriaId: "87EE567B-7604-41CC-B0A7-B51255D4C240", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*", matchCriteriaId: "E1AD57A9-F53A-4E40-966E-F2F50852C5E4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*", matchCriteriaId: "C4029113-130F-4A33-A8A0-BC3E74000378", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p4:*:*:*:*:*:*", matchCriteriaId: "46C5A6FD-7BBF-4E84-9895-8EE14DC846E4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p5:*:*:*:*:*:*", matchCriteriaId: "6D71D083-3279-4DF4-91E1-38C373DD062F", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p6:*:*:*:*:*:*", matchCriteriaId: "882669AB-BCFC-4517-A3E9-33D344F1ED0D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p7:*:*:*:*:*:*", matchCriteriaId: "BC3D24FB-50A2-4E37-A479-AF21F8ECD706", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p8:*:*:*:*:*:*", matchCriteriaId: "3070787D-76E1-4671-B99D-213F7103B3A2", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.0:p9:*:*:*:*:*:*", matchCriteriaId: "0140276F-9C31-4B5C-A5AC-DE0EBB885275", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.1:-:*:*:*:*:*:*", matchCriteriaId: "BD730B6A-F123-4685-ACB3-4F20AAAB77F3", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.1:p1:*:*:*:*:*:*", matchCriteriaId: "508150E3-2C0C-4EEB-BFC9-BB5CEB404C06", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.1:p2:*:*:*:*:*:*", matchCriteriaId: "B5D692EF-A5D7-430E-91BA-4CD137343B66", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.1:p3:*:*:*:*:*:*", matchCriteriaId: "D50C60A7-4C9F-4636-92E9-9F5B8B01BE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.1:p4:*:*:*:*:*:*", matchCriteriaId: "6C49F6C7-A740-42F4-93BB-512CBF334516", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.1:p5:*:*:*:*:*:*", matchCriteriaId: "402740C4-5B55-423F-BAD2-F742E1E21ADC", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.1:p6:*:*:*:*:*:*", matchCriteriaId: "9DCAA10A-C612-45E0-84B7-55897F49D65E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:12.1:p7:*:*:*:*:*:*", matchCriteriaId: "CB6258A5-8066-48B8-A417-09A1547DD57A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*", matchCriteriaId: "4479F76A-4B67-41CC-98C7-C76B81050F8E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", matchCriteriaId: "2AB443D1-D8E0-4253-9E1C-B62AEBBE582A", versionEndIncluding: "12.0.3", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "ECC00750-1DBF-401F-886E-E0E65A277409", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*", matchCriteriaId: "3198F822-43F8-4CB3-97F7-C2982FDA5CBD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", matchCriteriaId: "5AD2710B-E1DB-4D6C-9A0E-1EC033AEC709", versionEndExcluding: "11.5", vulnerable: true, }, { criteria: "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", matchCriteriaId: "82AF1567-8217-464E-896E-874EBB0FE463", versionEndExcluding: "12.10.9", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", matchCriteriaId: "10CC9ED4-9AE1-415A-94FF-60CB209506CA", versionEndExcluding: "14.0", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", matchCriteriaId: "16AF4D2F-3C55-4DCC-A253-3F8CB4F453EF", versionEndExcluding: "14.0", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", matchCriteriaId: "76BFC9D4-7D15-4C23-A54A-3F5A0B8BC542", versionEndExcluding: "11.0.1", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", matchCriteriaId: "0D16EC4D-D2E7-476D-BFBC-3703C8F0B45E", versionEndExcluding: "14.0", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", matchCriteriaId: "C117BCCF-7789-40BB-AD25-1E712F6DCF7C", versionEndExcluding: "7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.", }, { lang: "es", value: "SQLite versiones hasta 3.32.0, presenta un desbordamiento de enteros en la función sqlite3_str_vappendf en el archivo printf.c.", }, ], id: "CVE-2020-13434", lastModified: "2024-11-21T05:01:15.420", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-05-24T22:15:10.397", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2020/Dec/32", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2020/Nov/19", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2020/Nov/20", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2020/Nov/22", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2020/05/msg00024.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202007-26", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20200528-0004/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211843", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211844", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211850", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211931", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211935", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211952", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4394-1/", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuapr2022.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "https://www.sqlite.org/src/info/23439ea582241138", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.sqlite.org/src/info/d08d3405878d394e", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2020/Dec/32", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2020/Nov/19", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2020/Nov/20", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2020/Nov/22", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2020/05/msg00024.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202007-26", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20200528-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211843", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211844", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211850", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211931", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211935", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT211952", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4394-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuApr2021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuapr2022.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "https://www.sqlite.org/src/info/23439ea582241138", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.sqlite.org/src/info/d08d3405878d394e", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.