CVE-2020-13434

SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
References
Link Resource
https://www.sqlite.org/src/info/23439ea582241138 Exploit Patch
https://www.sqlite.org/src/info/d08d3405878d394e Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2020/05/msg00024.html Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20200528-0004/ Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/ Mailing List Third Party Advisory
https://usn.ubuntu.com/4394-1/ Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Patch Third Party Advisory
https://security.gentoo.org/glsa/202007-26 Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html Mailing List Third Party Advisory
https://support.apple.com/kb/HT211931 Third Party Advisory
https://support.apple.com/kb/HT211844 Third Party Advisory
https://support.apple.com/kb/HT211850 Third Party Advisory
https://support.apple.com/kb/HT211843 Third Party Advisory
https://support.apple.com/kb/HT211952 Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/22 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/20 Mailing List Third Party Advisory
https://support.apple.com/kb/HT211935 Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/32 Mailing List Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
Configurations

Configuration 1

cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.1:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.1:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p11:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.1:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.1:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.1:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.4:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.1:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.1:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.4:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.1:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Information

Published : 2020-05-24 10:15

Updated : 2023-01-09 04:41


NVD link : CVE-2020-13434

Mitre link : CVE-2020-13434

Products Affected
CWE