The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "lemon", "binary_version": "3.8.2-1ubuntu2.1" }, { "binary_name": "lemon-dbgsym", "binary_version": "3.8.2-1ubuntu2.1" }, { "binary_name": "libsqlite3-0", "binary_version": "3.8.2-1ubuntu2.1" }, { "binary_name": "libsqlite3-0-dbg", "binary_version": "3.8.2-1ubuntu2.1" }, { "binary_name": "libsqlite3-0-dbgsym", "binary_version": "3.8.2-1ubuntu2.1" }, { "binary_name": "libsqlite3-dev", "binary_version": "3.8.2-1ubuntu2.1" }, { "binary_name": "libsqlite3-dev-dbgsym", "binary_version": "3.8.2-1ubuntu2.1" }, { "binary_name": "libsqlite3-tcl", "binary_version": "3.8.2-1ubuntu2.1" }, { "binary_name": "libsqlite3-tcl-dbgsym", "binary_version": "3.8.2-1ubuntu2.1" }, { "binary_name": "sqlite3", "binary_version": "3.8.2-1ubuntu2.1" }, { "binary_name": "sqlite3-dbgsym", "binary_version": "3.8.2-1ubuntu2.1" }, { "binary_name": "sqlite3-doc", "binary_version": "3.8.2-1ubuntu2.1" } ] }