First published: Sat Jun 06 2020(Updated: )
SQLite is vulnerable to a denial of service, caused by a use-after-free in resetAccumulator in select.c. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
Credit: cve@mitre.org Richard Lorenz SAP
Affected Software | Affected Version | How to fix |
---|---|---|
SQLite SQLite | =3.32.2 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
Oracle Communications Messaging Server | =8.1 | |
Oracle Communications Network Charging And Control | =6.0.1 | |
Oracle Communications Network Charging And Control | =12.0.2 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
Oracle Hyperion Infrastructure Technology | =11.1.2.4 | |
Oracle Mysql Workbench | <=8.0.22 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
Siemens Sinec Infrastructure Network Services | <1.0.1.1 | |
Netapp Cloud Backup | ||
NetApp ONTAP Select Deploy administration utility | ||
Google Android | ||
IBM Data Risk Manager | <=2.0.6 | |
All of | ||
Google Chrome | <86.0.4240.99 | 86.0.4240.99 |
Google Android | * |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this SQLite vulnerability is CVE-2020-13871.
The severity of CVE-2020-13871 is high.
The software products affected by CVE-2020-13871 are Google Android, IBM Data Risk Manager, SQLite, Fedoraproject Fedora, Debian Debian Linux, Oracle Communications Messaging Server, Oracle Communications Network Charging And Control, Oracle Enterprise Manager Ops Center, Oracle Hyperion Infrastructure Technology, Oracle Mysql Workbench, Oracle ZFS Storage Appliance Kit, Siemens Sinec Infrastructure Network Services, Netapp Cloud Backup, and NetApp ONTAP Select Deploy administration utility.
The CVE-2020-13871 vulnerability can be exploited by sending a specially crafted request to the vulnerable SQLite version.
Yes, patches are available for some of the affected software products. Please refer to the respective vendor's website for patch information.