CVE-2025-3277

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*

History

01 Aug 2025, 18:29

Type Values Removed Values Added
CPE cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
References () https://sqlite.org/src/info/498e3f1cf57f164f - () https://sqlite.org/src/info/498e3f1cf57f164f - Patch
CWE CWE-190
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Sqlite
Sqlite sqlite

14 Apr 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-14 17:15

Updated : 2025-08-18 21:28


NVD link : CVE-2025-3277

Mitre link : CVE-2025-3277


JSON object : View

Products Affected

sqlite

  • sqlite
CWE
CWE-190

Integer Overflow or Wraparound