Saturday, October 14, 2023
HomeCyber Security22-12 months-Outdated Vulnerability Reported in Extensively Used SQLite Database Library

22-12 months-Outdated Vulnerability Reported in Extensively Used SQLite Database Library


A high-severity vulnerability has been disclosed within the SQLite database library, which was launched as a part of a code change courting all the way in which again to October 2000 and will allow attackers to crash or management packages.

Tracked as CVE-2022-35737 (CVSS rating: 7.5), the 22-year-old problem impacts SQLite variations 1.0.12 by means of 3.39.1, and has been addressed in model 3.39.2 launched on July 21, 2022.

“CVE-2022-35737 is exploitable on 64-bit techniques, and exploitability is determined by how this system is compiled,” Path of Bits researcher Andreas Kellas mentioned in a technical write-up revealed at the moment.

“Arbitrary code execution is confirmed when the library is compiled with out stack canaries, however unconfirmed when stack canaries are current, and denial-of-service is confirmed in all instances.”

SQLite Database Vulnerability

Programmed in C, SQLite is the most generally used database engine, included by default in Android, iOS, Home windows, and macOS, in addition to well-liked net browsers comparable to Google Chrome, Mozilla Firefox, and Apple Safari.

The vulnerability found by Path of Bits issues an integer overflow bug that happens when extraordinarily giant string inputs are handed as parameters to the SQLite implementations of the printf capabilities, which, in flip, make use of one other perform to deal with the string formatting (“sqlite3_str_vappendf“).

CyberSecurity

Nevertheless, a profitable weaponization of the flaw banks on the prerequisite that the string comprises the %Q, %q, or %w format substitution varieties, doubtlessly resulting in a program crash when user-controlled knowledge is written past the bounds of a stack-allocated buffer.

“If the format string comprises the ‘!’ particular character to allow unicode character scanning, then it’s doable to realize arbitrary code execution within the worst case, or to trigger this system to hold and loop (practically) indefinitely,” Kellas defined.

The vulnerability can also be an instance of a state of affairs that was as soon as deemed impractical many years in the past — allocating 1GB strings as enter — rendered possible with the arrival of 64-bit computing techniques.

“It is a bug that will not have appeared like an error on the time that it was written (courting again to 2000 within the SQLite supply code) when techniques had been primarily 32-bit architectures,” Kellas mentioned.





Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments