First published: Fri Apr 24 2015(Updated: )
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.04 | |
SQLite | <=3.8.8.3 | |
Debian Debian Linux | =8.0 | |
Apple Mac OS X | <=10.6.8 | |
Apple watchOS | <=1.0.1 | |
PHP | >=5.4.0<5.4.42 | |
PHP | >=5.5.0<5.5.26 | |
PHP | >=5.6.0<5.6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.