First published: Fri Dec 14 2018(Updated: )
Multiple flaws were found in sqlite. An attacker who is able to run arbitrary SQL statements could use this flaw to corrupt the internal databases, which can lead to arbitrary code execution as the user running sqlite. This issue was fixed via sqlite-3.25.3 release at: <a href="https://www.sqlite.org/releaselog/3_25_3.html">https://www.sqlite.org/releaselog/3_25_3.html</a> Also sqlite-3.36 introduced SQLITE_DBCONFIG_DEFENSIVE option which when added to the config file, could prevent attackers for corrupting the internal database files. This could however break applications which require users to write these database files. <a href="https://www.sqlite.org/releaselog/3_26_0.html">https://www.sqlite.org/releaselog/3_26_0.html</a> <a href="https://www.sqlite.org/c3ref/c_dbconfig_defensive.html#sqlitedbconfigdefensive">https://www.sqlite.org/c3ref/c_dbconfig_defensive.html#sqlitedbconfigdefensive</a>
Credit: Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team Tencent Blade Team cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iCloud for Windows | <7.10 | 7.10 |
Apple iTunes for Windows | <12.9.3 | 12.9.3 |
SQLite SQLite | <3.25.3 | |
Google Chrome | <71.0.3578.80 | |
Redhat Linux | =6.0 | |
Debian Debian Linux | =8.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 | |
Apple watchOS | <5.1.3 | 5.1.3 |
Apple macOS Mojave | <10.14.3 | 10.14.3 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.1.2 | 12.1.2 |
Apple iOS | <12.1.3 | 12.1.3 |
ubuntu/chromium | <71.0.3578.80-1 | 71.0.3578.80-1 |
ubuntu/sqlite3 | <3.22.0-1ubuntu0.1 | 3.22.0-1ubuntu0.1 |
ubuntu/sqlite3 | <3.24.0-1ubuntu0.1 | 3.24.0-1ubuntu0.1 |
ubuntu/sqlite3 | <3.8.2-1ubuntu2.2+ | 3.8.2-1ubuntu2.2+ |
ubuntu/sqlite3 | <3.25.3-1 | 3.25.3-1 |
ubuntu/sqlite3 | <3.11.0-1ubuntu1.2 | 3.11.0-1ubuntu1.2 |
Google Android | ||
debian/chromium | 90.0.4430.212-1~deb10u1 120.0.6099.224-1~deb11u1 121.0.6167.139-1~deb12u1 124.0.6367.201-1~deb12u1 124.0.6367.118-1 124.0.6367.201-1 | |
debian/sqlite | 2.8.17-15 2.8.17-15+deb10u1 | |
debian/sqlite3 | 3.27.2-3+deb10u1 3.27.2-3+deb10u2 3.34.1-3 3.40.1-2 3.45.3-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2018-20346
The severity of CVE-2018-20346 is high (8.1).
SQLite versions up to and exclusive of 3.25.3 are affected by CVE-2018-20346.
Remote attackers can exploit CVE-2018-20346 by leveraging the ability to run arbitrary SQL statements after crafted changes to FTS3 shadow tables, resulting in arbitrary code execution.
The fixed version for CVE-2018-20346 is 3.25.3.