CVE-2018-20505

SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
References
Link Resource
http://seclists.org/fulldisclosure/2019/Jan/62 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jan/64 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jan/66 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jan/67 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jan/68 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jan/69 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/106698 Third Party Advisory VDB Entry
https://seclists.org/bugtraq/2019/Jan/28 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jan/29 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jan/31 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jan/32 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jan/33 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jan/39 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20190502-0004/ Third Party Advisory
https://sqlite.org/src/info/1a84668dcfdebaf12415d Exploit Vendor Advisory
https://support.apple.com/kb/HT209443 Vendor Advisory
https://support.apple.com/kb/HT209446 Vendor Advisory
https://support.apple.com/kb/HT209447 Vendor Advisory
https://support.apple.com/kb/HT209448 Vendor Advisory
https://support.apple.com/kb/HT209450 Vendor Advisory
https://support.apple.com/kb/HT209451 Vendor Advisory
https://usn.ubuntu.com/4019-1/
http://seclists.org/fulldisclosure/2019/Jan/62 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jan/64 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jan/66 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jan/67 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jan/68 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jan/69 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/106698 Third Party Advisory VDB Entry
https://seclists.org/bugtraq/2019/Jan/28 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jan/29 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jan/31 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jan/32 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jan/33 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jan/39 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20190502-0004/ Third Party Advisory
https://sqlite.org/src/info/1a84668dcfdebaf12415d Exploit Vendor Advisory
https://support.apple.com/kb/HT209443 Vendor Advisory
https://support.apple.com/kb/HT209446 Vendor Advisory
https://support.apple.com/kb/HT209447 Vendor Advisory
https://support.apple.com/kb/HT209448 Vendor Advisory
https://support.apple.com/kb/HT209450 Vendor Advisory
https://support.apple.com/kb/HT209451 Vendor Advisory
https://usn.ubuntu.com/4019-1/
Configurations

Configuration 1 (hide)

cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:01

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2019/Jan/62 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2019/Jan/62 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2019/Jan/64 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2019/Jan/64 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2019/Jan/66 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2019/Jan/66 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2019/Jan/67 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2019/Jan/67 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2019/Jan/68 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2019/Jan/68 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2019/Jan/69 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2019/Jan/69 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/106698 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106698 - Third Party Advisory, VDB Entry
References () https://seclists.org/bugtraq/2019/Jan/28 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jan/28 - Mailing List, Third Party Advisory
References () https://seclists.org/bugtraq/2019/Jan/29 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jan/29 - Mailing List, Third Party Advisory
References () https://seclists.org/bugtraq/2019/Jan/31 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jan/31 - Mailing List, Third Party Advisory
References () https://seclists.org/bugtraq/2019/Jan/32 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jan/32 - Mailing List, Third Party Advisory
References () https://seclists.org/bugtraq/2019/Jan/33 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jan/33 - Mailing List, Third Party Advisory
References () https://seclists.org/bugtraq/2019/Jan/39 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jan/39 - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20190502-0004/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20190502-0004/ - Third Party Advisory
References () https://sqlite.org/src/info/1a84668dcfdebaf12415d - Exploit, Vendor Advisory () https://sqlite.org/src/info/1a84668dcfdebaf12415d - Exploit, Vendor Advisory
References () https://support.apple.com/kb/HT209443 - Vendor Advisory () https://support.apple.com/kb/HT209443 - Vendor Advisory
References () https://support.apple.com/kb/HT209446 - Vendor Advisory () https://support.apple.com/kb/HT209446 - Vendor Advisory
References () https://support.apple.com/kb/HT209447 - Vendor Advisory () https://support.apple.com/kb/HT209447 - Vendor Advisory
References () https://support.apple.com/kb/HT209448 - Vendor Advisory () https://support.apple.com/kb/HT209448 - Vendor Advisory
References () https://support.apple.com/kb/HT209450 - Vendor Advisory () https://support.apple.com/kb/HT209450 - Vendor Advisory
References () https://support.apple.com/kb/HT209451 - Vendor Advisory () https://support.apple.com/kb/HT209451 - Vendor Advisory
References () https://usn.ubuntu.com/4019-1/ - () https://usn.ubuntu.com/4019-1/ -

Information

Published : 2019-04-03 18:29

Updated : 2024-11-21 04:01


NVD link : CVE-2018-20505

Mitre link : CVE-2018-20505

CVE.ORG link : CVE-2018-20505


JSON object : View

Products Affected

apple

  • mac_os_x
  • icloud
  • watchos
  • itunes
  • iphone_os

microsoft

  • windows

sqlite

  • sqlite
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')