First published: Thu May 09 2019(Updated: )
An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.
Credit: talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
SQLite SQLite | =3.26.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
redhat/sqlite | <3.28.0 | 3.28.0 |
Google Android | ||
debian/sqlite3 | 3.34.1-3 3.34.1-3+deb11u1 3.40.1-2+deb12u1 3.46.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5018 is an exploitable use after free vulnerability in the window function functionality of Sqlite3 3.26.0.
CVE-2019-5018 has a severity rating of 8.1 (high).
CVE-2019-5018 affects Sqlite3 version 3.26.0.
CVE-2019-5018 can be exploited by sending a specially crafted SQL command.
The remedy for CVE-2019-5018 is to update to version 3.27.2-2ubuntu0.2 of Sqlite3.