![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.128120 |
Categoría: | Buffer overflow |
Título: | SQLite 3.44.0 - 3.49.0 Multiple Vulnerabilities |
Resumen: | SQLite is prone to multiple vulnerabilities. |
Descripción: | Summary: SQLite is prone to multiple vulnerabilities. Vulnerability Insight: The following flaws exist: - CVE-2025-29087: The concat_ws() SQL function can cause memory to be written beyond the end of a malloc-allocated buffer. If the separator argument is attacker-controlled and has a large string (e.g., 2MB or more), an integer overflow occurs in calculating the size of the result buffer, and thus malloc may not allocate enough memory. - CVE-2025-3277: An integer overflow can be triggered in SQLite `concat_ws()`function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~ 4GB can be triggered. This can result in arbitrary code execution. Affected Software/OS: SQLite versions 3.44.0 through 3.49.0. Solution: Update to version 3.49.1 or later. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2025-29087 Common Vulnerability Exposure (CVE) ID: CVE-2025-3277 |
Copyright | Copyright (C) 2025 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |