{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2018-12-21T00:00:00.000Z","descriptions":[{"lang":"en","value":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-07-31T07:06:25.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"https://worthdoingbadly.com/sqlitebug/"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.apple.com/HT209446"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677"},{"name":"[debian-lts-announce] 20181222 [SECURITY] [DLA 1613-1] sqlite3 security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.synology.com/security/advisory/Synology_SA_18_61"},{"tags":["x_refsource_MISC"],"url":"https://access.redhat.com/articles/3758321"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.apple.com/HT209443"},{"tags":["x_refsource_MISC"],"url":"https://blade.tencent.com/magellan/index_en.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.apple.com/HT209451"},{"tags":["x_refsource_MISC"],"url":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html"},{"tags":["x_refsource_MISC"],"url":"https://news.ycombinator.com/item?id=18685296"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.apple.com/HT209450"},{"tags":["x_refsource_MISC"],"url":"https://sqlite.org/src/info/940f2adc8541a838"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.apple.com/HT209448"},{"tags":["x_refsource_MISC"],"url":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e"},{"tags":["x_refsource_MISC"],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html"},{"name":"106323","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/106323"},{"tags":["x_refsource_MISC"],"url":"https://crbug.com/900910"},{"tags":["x_refsource_MISC"],"url":"https://sqlite.org/src/info/d44318f59044162e"},{"name":"FreeBSD-EN-19:03","tags":["vendor-advisory","x_refsource_FREEBSD"],"url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc"},{"tags":["x_refsource_MISC"],"url":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"},{"tags":["x_refsource_MISC"],"url":"https://www.sqlite.org/releaselog/3_25_3.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.apple.com/HT209447"},{"name":"openSUSE-SU-2019:1159","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html"},{"name":"openSUSE-SU-2019:1222","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html"},{"name":"GLSA-201904-21","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"https://security.gentoo.org/glsa/201904-21"},{"name":"USN-4019-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/4019-1/"},{"name":"USN-4019-2","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/4019-2/"},{"name":"FEDORA-2019-49f80a78bc","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/"},{"tags":["x_refsource_MISC"],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"name":"[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2018-20346","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://worthdoingbadly.com/sqlitebug/","refsource":"MISC","url":"https://worthdoingbadly.com/sqlitebug/"},{"name":"https://support.apple.com/HT209446","refsource":"CONFIRM","url":"https://support.apple.com/HT209446"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379","refsource":"MISC","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677","refsource":"MISC","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677"},{"name":"[debian-lts-announce] 20181222 [SECURITY] [DLA 1613-1] sqlite3 security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html"},{"name":"https://www.synology.com/security/advisory/Synology_SA_18_61","refsource":"CONFIRM","url":"https://www.synology.com/security/advisory/Synology_SA_18_61"},{"name":"https://access.redhat.com/articles/3758321","refsource":"MISC","url":"https://access.redhat.com/articles/3758321"},{"name":"https://support.apple.com/HT209443","refsource":"CONFIRM","url":"https://support.apple.com/HT209443"},{"name":"https://blade.tencent.com/magellan/index_en.html","refsource":"MISC","url":"https://blade.tencent.com/magellan/index_en.html"},{"name":"https://support.apple.com/HT209451","refsource":"CONFIRM","url":"https://support.apple.com/HT209451"},{"name":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html","refsource":"MISC","url":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html"},{"name":"https://news.ycombinator.com/item?id=18685296","refsource":"MISC","url":"https://news.ycombinator.com/item?id=18685296"},{"name":"https://support.apple.com/HT209450","refsource":"CONFIRM","url":"https://support.apple.com/HT209450"},{"name":"https://sqlite.org/src/info/940f2adc8541a838","refsource":"MISC","url":"https://sqlite.org/src/info/940f2adc8541a838"},{"name":"https://support.apple.com/HT209448","refsource":"CONFIRM","url":"https://support.apple.com/HT209448"},{"name":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e","refsource":"MISC","url":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e"},{"name":"https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html","refsource":"MISC","url":"https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html"},{"name":"106323","refsource":"BID","url":"http://www.securityfocus.com/bid/106323"},{"name":"https://crbug.com/900910","refsource":"MISC","url":"https://crbug.com/900910"},{"name":"https://sqlite.org/src/info/d44318f59044162e","refsource":"MISC","url":"https://sqlite.org/src/info/d44318f59044162e"},{"name":"FreeBSD-EN-19:03","refsource":"FREEBSD","url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc"},{"name":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html","refsource":"MISC","url":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"},{"name":"https://www.sqlite.org/releaselog/3_25_3.html","refsource":"MISC","url":"https://www.sqlite.org/releaselog/3_25_3.html"},{"name":"https://support.apple.com/HT209447","refsource":"CONFIRM","url":"https://support.apple.com/HT209447"},{"name":"openSUSE-SU-2019:1159","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html"},{"name":"openSUSE-SU-2019:1222","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html"},{"name":"GLSA-201904-21","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201904-21"},{"name":"USN-4019-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/4019-1/"},{"name":"USN-4019-2","refsource":"UBUNTU","url":"https://usn.ubuntu.com/4019-2/"},{"name":"FEDORA-2019-49f80a78bc","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/"},{"name":"https://www.oracle.com/security-alerts/cpuapr2020.html","refsource":"MISC","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"name":"[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T11:58:19.161Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://worthdoingbadly.com/sqlitebug/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.apple.com/HT209446"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677"},{"name":"[debian-lts-announce] 20181222 [SECURITY] [DLA 1613-1] sqlite3 security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.synology.com/security/advisory/Synology_SA_18_61"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://access.redhat.com/articles/3758321"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.apple.com/HT209443"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://blade.tencent.com/magellan/index_en.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.apple.com/HT209451"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://news.ycombinator.com/item?id=18685296"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.apple.com/HT209450"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://sqlite.org/src/info/940f2adc8541a838"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.apple.com/HT209448"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html"},{"name":"106323","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/106323"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://crbug.com/900910"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://sqlite.org/src/info/d44318f59044162e"},{"name":"FreeBSD-EN-19:03","tags":["vendor-advisory","x_refsource_FREEBSD","x_transferred"],"url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.sqlite.org/releaselog/3_25_3.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.apple.com/HT209447"},{"name":"openSUSE-SU-2019:1159","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html"},{"name":"openSUSE-SU-2019:1222","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html"},{"name":"GLSA-201904-21","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"https://security.gentoo.org/glsa/201904-21"},{"name":"USN-4019-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/4019-1/"},{"name":"USN-4019-2","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/4019-2/"},{"name":"FEDORA-2019-49f80a78bc","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"name":"[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2018-20346","datePublished":"2018-12-21T21:00:00.000Z","dateReserved":"2018-12-21T00:00:00.000Z","dateUpdated":"2024-08-05T11:58:19.161Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}