Buffer Overflow vulnerability found in SQLite3 v.3.27.1 and before allows a local attacker to cause a denial of service via a crafted script.
References
Link | Resource |
---|---|
https://security.netapp.com/advisory/ntap-20230526-0005/ | |
https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959 | Exploit Issue Tracking Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230526-0005/ | |
https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959 | Exploit Issue Tracking Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.netapp.com/advisory/ntap-20230526-0005/ - | |
References | () https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959 - Exploit, Issue Tracking, Patch, Vendor Advisory |
26 May 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-04-11 18:15
Updated : 2024-11-21 05:15
NVD link : CVE-2020-24736
Mitre link : CVE-2020-24736
CVE.ORG link : CVE-2020-24736
JSON object : View
Products Affected
ghost
- sqlite3
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')