The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
2015-04-24T17:59:02.363
2025-04-12T10:46:40.837
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | canonical | ubuntu_linux | 12.04 | Yes |
Operating System | canonical | ubuntu_linux | 14.04 | Yes |
Operating System | canonical | ubuntu_linux | 15.04 | Yes |
Application | sqlite | sqlite | ≤ 3.8.8.3 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Operating System | apple | mac_os_x | ≤ 10.6.8 | Yes |
Operating System | apple | watchos | ≤ 1.0.1 | Yes |
Application | php | php | < 5.4.42 | Yes |
Application | php | php | < 5.5.26 | Yes |
Application | php | php | < 5.6.10 | Yes |