{"api_version":"1","generated_at":"2026-04-23T02:35:48+00:00","cve":"CVE-2018-20346","urls":{"html":"https://cve.report/CVE-2018-20346","api":"https://cve.report/api/cve/CVE-2018-20346.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-20346","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-20346"},"summary":{"title":"CVE-2018-20346","description":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-12-21 21:29:00","updated_at":"2023-11-07 02:56:00"},"problem_types":["CWE-190"],"metrics":[],"references":[{"url":"https://www.synology.com/security/advisory/Synology_SA_18_61","name":"https://www.synology.com/security/advisory/Synology_SA_18_61","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Synology Inc.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/articles/3758321","name":"https://access.redhat.com/articles/3758321","refsource":"MISC","tags":["Third Party Advisory"],"title":"Multiple remote code execution flaws in sqlite (Magellan) - Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT209446","name":"https://support.apple.com/HT209446","refsource":"CONFIRM","tags":[],"title":"About the security content of macOS Mojave 10.14.3, Security Update 2019-001 High Sierra, Security Update 2019-001 Sierra - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.sqlite.org/releaselog/3_25_3.html","name":"https://www.sqlite.org/releaselog/3_25_3.html","refsource":"MISC","tags":["Release Notes","Vendor Advisory"],"title":"SQLite Release 3.25.3 On 2018-11-05","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT209448","name":"https://support.apple.com/HT209448","refsource":"CONFIRM","tags":[],"title":"About the security content of watchOS 5.1.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html","name":"openSUSE-SU-2019:1159","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2019:1159-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html","name":"openSUSE-SU-2019:1222","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2019:1222-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://sqlite.org/src/info/d44318f59044162e","name":"https://sqlite.org/src/info/d44318f59044162e","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"SQLite: Check-in [d44318f5]","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677","refsource":"MISC","tags":["Issue Tracking","Third Party Advisory"],"title":"1659677 – CVE-2018-20346 sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan) [fedora-all]","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://blade.tencent.com/magellan/index_en.html","name":"https://blade.tencent.com/magellan/index_en.html","refsource":"MISC","tags":["Third Party Advisory"],"title":"Magellan - Tencent Blade Team","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365","refsource":"CONFIRM","tags":[],"title":"Security Bulletin - Policy Auditor update fixes multiple vulnerabilities in third-party libraries (CVE-2016-0718, CVE-2016-4472, CVE-2016-5300, CVE-2017-17740, CVE-2017-9287, CVE-2019-13057, CVE-2020-15719, CVE-2019-1543, CVE-2019-1547, CVE-2019-1552, CVE-2019-1563, CVE-2019-8457, CVE-2018-20506, CVE-2018-20346, CVE-2019-16168, CVE-2017-12627)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/HT209450","name":"https://support.apple.com/HT209450","refsource":"CONFIRM","tags":[],"title":"About the security content of iTunes 12.9.3 for Windows - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html","name":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html","refsource":"","tags":[],"title":"Re: [sqlite] Claimed vulnerability in SQLite: Info or Intox?","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","name":"FEDORA-2019-49f80a78bc","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 29 Update: mingw-sqlite-3.26.0.0-1.fc29 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201904-21","name":"GLSA-201904-21","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"SQLite: Remote code execution (GLSA 201904-21) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","name":"[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2340-1] sqlite3 security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT209447","name":"https://support.apple.com/HT209447","refsource":"CONFIRM","tags":[],"title":"About the security content of tvOS 12.1.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html","name":"https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html","refsource":"MISC","tags":["Mailing List","Third Party Advisory"],"title":"Re: [sqlite] Claimed vulnerability in SQLite: Info or Intox?","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html","name":"[debian-lts-announce] 20181222 [SECURITY] [DLA 1613-1] sqlite3 security update","refsource":"MLIST","tags":["Mailing List","Third Party Advisory"],"title":"[SECURITY] [DLA 1613-1] sqlite3 security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://worthdoingbadly.com/sqlitebug/","name":"https://worthdoingbadly.com/sqlitebug/","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"Crash Chrome 70 with the SQLite Magellan bug | Worth Doing Badly","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT209443","name":"https://support.apple.com/HT209443","refsource":"CONFIRM","tags":[],"title":"About the security content of iOS 12.1.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379","refsource":"MISC","tags":["Issue Tracking","Third Party Advisory"],"title":"1659379 – (CVE-2018-20346, CVE-2018-20505, CVE-2018-20506) CVE-2018-20346 CVE-2018-20505 CVE-2018-20506 sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e","name":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e","refsource":"MISC","tags":["Third Party Advisory"],"title":"c368e30ae55600a1c3c9cb1710a54f9c55de786e - chromium/src - Git at Google","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc","name":"FreeBSD-EN-19:03","refsource":"FREEBSD","tags":["Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://crbug.com/900910","name":"https://crbug.com/900910","refsource":"MISC","tags":["Permissions Required","Third Party Advisory"],"title":"900910 - \n \n \n chromium -\n \n \n An open-source project to help move the web forward. - \n \n Monorail","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/106323","name":"106323","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"SQLite CVE-2018-20346 Remote Integer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","name":"FEDORA-2019-49f80a78bc","refsource":"","tags":[],"title":"[SECURITY] Fedora 29 Update: mingw-sqlite-3.26.0.0-1.fc29 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html","name":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"worthdoingbadly.com/2018-12-14-sqlitebug.html at master · zhuowei/worthdoingbadly.com · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT209451","name":"https://support.apple.com/HT209451","refsource":"CONFIRM","tags":[],"title":"About the security content of iCloud for Windows 7.10 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://usn.ubuntu.com/4019-2/","name":"USN-4019-2","refsource":"UBUNTU","tags":[],"title":"USN-4019-2: SQLite vulnerabilities | Ubuntu security notices","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://news.ycombinator.com/item?id=18685296","name":"https://news.ycombinator.com/item?id=18685296","refsource":"MISC","tags":["Third Party Advisory"],"title":"Remote code execution vulnerability in SQLite | Hacker News","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.oracle.com/security-alerts/cpuapr2020.html","name":"N/A","refsource":"N/A","tags":[],"title":"Oracle Critical Patch Update Advisory - April 2020","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html","name":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html","refsource":"MISC","tags":["Third Party Advisory"],"title":"Chrome Releases: Stable Channel Update for Desktop","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://usn.ubuntu.com/4019-1/","name":"USN-4019-1","refsource":"UBUNTU","tags":[],"title":"USN-4019-1: SQLite vulnerabilities | Ubuntu security notices","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://sqlite.org/src/info/940f2adc8541a838","name":"https://sqlite.org/src/info/940f2adc8541a838","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"SQLite: Check-in [940f2adc]","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-20346","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20346","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"google","cpe5":"chrome","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"google","cpe5":"chrome","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"42.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"42.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"linux","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"linux","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sqlite","cpe5":"sqlite","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20346","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sqlite","cpe5":"sqlite","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2018-20346","qid":"710164","title":"Gentoo Linux SQLite Remote code execution Vulnerability (GLSA 201904-21)"},{"cve":"CVE-2018-20346","qid":"751168","title":"SUSE Enterprise Linux Security Update for sqlite3 (SUSE-SU-2021:3215-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2018-20346","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://worthdoingbadly.com/sqlitebug/","refsource":"MISC","url":"https://worthdoingbadly.com/sqlitebug/"},{"refsource":"CONFIRM","name":"https://support.apple.com/HT209446","url":"https://support.apple.com/HT209446"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379","refsource":"MISC","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677","refsource":"MISC","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677"},{"name":"[debian-lts-announce] 20181222 [SECURITY] [DLA 1613-1] sqlite3 security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html"},{"name":"https://www.synology.com/security/advisory/Synology_SA_18_61","refsource":"CONFIRM","url":"https://www.synology.com/security/advisory/Synology_SA_18_61"},{"name":"https://access.redhat.com/articles/3758321","refsource":"MISC","url":"https://access.redhat.com/articles/3758321"},{"refsource":"CONFIRM","name":"https://support.apple.com/HT209443","url":"https://support.apple.com/HT209443"},{"name":"https://blade.tencent.com/magellan/index_en.html","refsource":"MISC","url":"https://blade.tencent.com/magellan/index_en.html"},{"refsource":"CONFIRM","name":"https://support.apple.com/HT209451","url":"https://support.apple.com/HT209451"},{"name":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html","refsource":"MISC","url":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html"},{"name":"https://news.ycombinator.com/item?id=18685296","refsource":"MISC","url":"https://news.ycombinator.com/item?id=18685296"},{"refsource":"CONFIRM","name":"https://support.apple.com/HT209450","url":"https://support.apple.com/HT209450"},{"name":"https://sqlite.org/src/info/940f2adc8541a838","refsource":"MISC","url":"https://sqlite.org/src/info/940f2adc8541a838"},{"refsource":"CONFIRM","name":"https://support.apple.com/HT209448","url":"https://support.apple.com/HT209448"},{"name":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e","refsource":"MISC","url":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e"},{"name":"https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html","refsource":"MISC","url":"https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html"},{"name":"106323","refsource":"BID","url":"http://www.securityfocus.com/bid/106323"},{"name":"https://crbug.com/900910","refsource":"MISC","url":"https://crbug.com/900910"},{"name":"https://sqlite.org/src/info/d44318f59044162e","refsource":"MISC","url":"https://sqlite.org/src/info/d44318f59044162e"},{"name":"FreeBSD-EN-19:03","refsource":"FREEBSD","url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc"},{"name":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html","refsource":"MISC","url":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"},{"name":"https://www.sqlite.org/releaselog/3_25_3.html","refsource":"MISC","url":"https://www.sqlite.org/releaselog/3_25_3.html"},{"refsource":"CONFIRM","name":"https://support.apple.com/HT209447","url":"https://support.apple.com/HT209447"},{"refsource":"SUSE","name":"openSUSE-SU-2019:1159","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html"},{"refsource":"SUSE","name":"openSUSE-SU-2019:1222","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html"},{"refsource":"GENTOO","name":"GLSA-201904-21","url":"https://security.gentoo.org/glsa/201904-21"},{"refsource":"UBUNTU","name":"USN-4019-1","url":"https://usn.ubuntu.com/4019-1/"},{"refsource":"UBUNTU","name":"USN-4019-2","url":"https://usn.ubuntu.com/4019-2/"},{"refsource":"FEDORA","name":"FEDORA-2019-49f80a78bc","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/"},{"url":"https://www.oracle.com/security-alerts/cpuapr2020.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"refsource":"MLIST","name":"[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"refsource":"CONFIRM","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"}]}},"nvd":{"publishedDate":"2018-12-21 21:29:00","lastModifiedDate":"2023-11-07 02:56:00","problem_types":["CWE-190"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","versionEndExcluding":"3.25.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","versionEndExcluding":"71.0.3578.80","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"20346","Ordinal":"140694","Title":"CVE-2018-20346","CVE":"CVE-2018-20346","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"20346","Ordinal":"1","NoteData":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"20346","Ordinal":"2","NoteData":"2018-12-21","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"20346","Ordinal":"3","NoteData":"2021-07-31","Type":"Other","Title":"Modified"}]}}}