First published: Fri Apr 24 2015(Updated: )
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
SQLite | <=3.8.8.3 | |
Debian Linux | =8.0 | |
Apple iOS and macOS | <=10.6.8 | |
Apple iOS, iPadOS, and watchOS | <=1.0.1 | |
PHP | >=5.4.0<5.4.42 | |
PHP | >=5.5.0<5.5.26 | |
PHP | >=5.6.0<5.6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3416 has been classified with a moderate severity due to its potential for causing denial of service via integer overflow and stack-based buffer overflow.
To fix CVE-2015-3416, update SQLite to version 3.8.9 or later, or apply relevant patches from your operating system vendor.
CVE-2015-3416 affects various distributions including Ubuntu 12.04, 14.04, and 15.04, as well as Debian 8.0 and certain versions of macOS and PHP.
CVE-2015-3416 introduces vulnerabilities that can lead to denial of service through integer overflow and stack-based buffer overflow.
As of the last updates, there have been no confirmed reports of active exploitation of CVE-2015-3416 in the wild, but it is advisable to apply patches promptly.