2018-12-27 00:08:07 -05:00
{
2019-03-18 02:08:41 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2018-20506" ,
2019-04-03 18:00:46 +00:00
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
2019-03-18 02:08:41 +00:00
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2019-04-03 18:00:46 +00:00
"value" : "SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a \"merge\" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"url" : "https://sqlite.org/src/info/940f2adc8541a838" ,
"refsource" : "MISC" ,
"name" : "https://sqlite.org/src/info/940f2adc8541a838"
} ,
{
"url" : "http://seclists.org/fulldisclosure/2019/Jan/62" ,
"refsource" : "MISC" ,
"name" : "http://seclists.org/fulldisclosure/2019/Jan/62"
} ,
{
"url" : "http://seclists.org/fulldisclosure/2019/Jan/64" ,
"refsource" : "MISC" ,
"name" : "http://seclists.org/fulldisclosure/2019/Jan/64"
} ,
{
"url" : "http://seclists.org/fulldisclosure/2019/Jan/66" ,
"refsource" : "MISC" ,
"name" : "http://seclists.org/fulldisclosure/2019/Jan/66"
} ,
{
"url" : "http://seclists.org/fulldisclosure/2019/Jan/67" ,
"refsource" : "MISC" ,
"name" : "http://seclists.org/fulldisclosure/2019/Jan/67"
} ,
{
"url" : "http://seclists.org/fulldisclosure/2019/Jan/68" ,
"refsource" : "MISC" ,
"name" : "http://seclists.org/fulldisclosure/2019/Jan/68"
} ,
{
"url" : "http://seclists.org/fulldisclosure/2019/Jan/69" ,
"refsource" : "MISC" ,
"name" : "http://seclists.org/fulldisclosure/2019/Jan/69"
} ,
{
"url" : "http://www.securityfocus.com/bid/106698" ,
"refsource" : "MISC" ,
"name" : "http://www.securityfocus.com/bid/106698"
} ,
{
"url" : "https://seclists.org/bugtraq/2019/Jan/28" ,
"refsource" : "MISC" ,
"name" : "https://seclists.org/bugtraq/2019/Jan/28"
} ,
{
"url" : "https://seclists.org/bugtraq/2019/Jan/29" ,
"refsource" : "MISC" ,
"name" : "https://seclists.org/bugtraq/2019/Jan/29"
} ,
{
"url" : "https://seclists.org/bugtraq/2019/Jan/31" ,
"refsource" : "MISC" ,
"name" : "https://seclists.org/bugtraq/2019/Jan/31"
} ,
{
"url" : "https://seclists.org/bugtraq/2019/Jan/32" ,
"refsource" : "MISC" ,
"name" : "https://seclists.org/bugtraq/2019/Jan/32"
} ,
{
"url" : "https://seclists.org/bugtraq/2019/Jan/33" ,
"refsource" : "MISC" ,
"name" : "https://seclists.org/bugtraq/2019/Jan/33"
} ,
{
"url" : "https://seclists.org/bugtraq/2019/Jan/39" ,
"refsource" : "MISC" ,
"name" : "https://seclists.org/bugtraq/2019/Jan/39"
} ,
{
"url" : "https://support.apple.com/kb/HT209443" ,
"refsource" : "MISC" ,
"name" : "https://support.apple.com/kb/HT209443"
} ,
{
"url" : "https://support.apple.com/kb/HT209446" ,
"refsource" : "MISC" ,
"name" : "https://support.apple.com/kb/HT209446"
} ,
{
"url" : "https://support.apple.com/kb/HT209447" ,
"refsource" : "MISC" ,
"name" : "https://support.apple.com/kb/HT209447"
} ,
{
"url" : "https://support.apple.com/kb/HT209448" ,
"refsource" : "MISC" ,
"name" : "https://support.apple.com/kb/HT209448"
} ,
{
"url" : "https://support.apple.com/kb/HT209450" ,
"refsource" : "MISC" ,
"name" : "https://support.apple.com/kb/HT209450"
} ,
{
"url" : "https://support.apple.com/kb/HT209451" ,
"refsource" : "MISC" ,
"name" : "https://support.apple.com/kb/HT209451"
2019-03-18 02:08:41 +00:00
}
]
}
}