An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0777 | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/108294 | Broken Link |
http://packetstormsecurity.com/files/152809/Sqlite3-Window-Function-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
https://security.netapp.com/advisory/ntap-20190521-0001/ | Third Party Advisory |
https://security.gentoo.org/glsa/201908-09 | Third Party Advisory |
https://usn.ubuntu.com/4205-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2019-05-10 12:29
Updated : 2022-06-13 11:42
NVD link : CVE-2019-5018
Mitre link : CVE-2019-5018
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
canonical
- ubuntu_linux
sqlite
- sqlite