CVE-2018-20346
Publication date 21 December 2018
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
Status
Package | Ubuntu Release | Status |
---|---|---|
chromium | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
sqlite3 | ||
18.04 LTS bionic |
Fixed 3.22.0-1ubuntu0.1
|
|
16.04 LTS xenial |
Fixed 3.11.0-1ubuntu1.2
|
|
14.04 LTS trusty |
Fixed 3.8.2-1ubuntu2.2+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4019-1
- SQLite vulnerabilities
- 19 June 2019
- USN-4019-2
- SQLite vulnerabilities
- 19 June 2019
Other references
- https://blade.tencent.com/magellan/index_en.html
- https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html
- https://access.redhat.com/articles/3758321
- https://bugzilla.redhat.com/show_bug.cgi?id=1659379
- https://bugzilla.redhat.com/show_bug.cgi?id=1659677
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e
- https://crbug.com/900910
- https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html
- https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html
- https://news.ycombinator.com/item?id=18685296
- https://sqlite.org/src/info/940f2adc8541a838
- https://sqlite.org/src/info/d44318f59044162e
- https://worthdoingbadly.com/sqlitebug/
- https://www.sqlite.org/releaselog/3_25_3.html
- https://www.cve.org/CVERecord?id=CVE-2018-20346