We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3277



Description

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

Reserved 2025-04-04 | Published 2025-04-14 | Updated 2025-05-27 | Assigner Google


MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L

Problem types

CWE-122 Heap-based Buffer Overflow

Product status

Default status
unaffected

< 3.49.1
affected

Credits

王跃林 (Yuelin Wang) finder

References

sqlite.org/src/info/498e3f1cf57f164f

cve.org (CVE-2025-3277)

nvd.nist.gov (CVE-2025-3277)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3277

Support options

Helpdesk Chat, Email, Knowledgebase