The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of SQLite: database corruption using unsafe temporary folders

Synthesis of the vulnerability 

An attacker can access to temporary files created by SQLite in order to read or change the content of a protected database.
Vulnerable systems: Debian, VNX Operating Environment, VNX Series, Fedora, Juniper EX-Series, Juniper J-Series, Junos OS, MX-Series, PTX-Series, QFX-Series, SRX-Series, openSUSE, openSUSE Leap, Oracle DB, Solaris, SQLite, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this threat: 1/4.
Creation date: 04/07/2016.
Références of this weakness: bulletinjul2018, cpuoct2020, CVE-2016-6153, DLA-543-1, DSA-2020-030, FEDORA-2016-0138339b54, FEDORA-2019-49f80a78bc, JSA11055, KL-001-2016-003, openSUSE-SU-2016:1932-1, openSUSE-SU-2016:2041-1, SUSE-SU-2019:0973-1, USN-4019-1, USN-4019-2, VIGILANCE-VUL-20018.

Description of the vulnerability 

SQLite is an embedded database manager.

When the application does not specify where the library should create temporary files, SQLite uses an internally fixed list of candidate folders. However, the check for permissions of these folders is wrong, so the library can create temporary files as the ones used for transaction implementation, which will be readable or writable by unauthorized process.

An attacker can therefore access to temporary files created by SQLite in order to read or change the content of a protected database.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This threat alert impacts software or systems such as Debian, VNX Operating Environment, VNX Series, Fedora, Juniper EX-Series, Juniper J-Series, Junos OS, MX-Series, PTX-Series, QFX-Series, SRX-Series, openSUSE, openSUSE Leap, Oracle DB, Solaris, SQLite, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this computer vulnerability bulletin is low.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this weakness note.

Solutions for this threat 

SQLite: version 3.13.0.
The version 3.13.0 is fixed:
  https://www.sqlite.org/2016/sqlite-amalgamation-3130000.zip

Debian: new sqlite3 packages.
New packages are available:
  Debian 7: sqlite3 3.7.13-1+deb7u3

Dell EMC VNXe3200: version 3.1.11.10003441.
The version 3.1.11.10003441 is fixed:
  https://www.dell.com/support/

Fedora 24: new sqlite packages.
New packages are available:
  Fedora 24: sqlite 3.13.0-1.fc24

Fedora 29: new mingw-sqlite packages.
New packages are available:
  Fedora 29: mingw-sqlite 3.26.0.0-1.fc29

Junos OS: fixed versions for SQLite.
Fixed versions are indicated in information sources.

openSUSE: new sqlite3 packages.
New packages are available:
  openSUSE 13.2: sqlite3 3.8.6-3.1
  openSUSE Leap 42.1: sqlite3 3.8.10.2-7.1

Oracle Database: CPU of October 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2694898.1

Oracle Solaris: patch for third party software of July 2018 v3.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

SUSE LE 12 RTM: new sqlite3 packages.
New packages are available:
  SUSE LE 12 RTM: sqlite3 3.8.3.1-2.7.1

Ubuntu: new sqlite3 packages.
New packages are available:
  Ubuntu 19.04: sqlite3 3.27.2-2ubuntu0.1
  Ubuntu 18.10: sqlite3 3.24.0-1ubuntu0.1
  Ubuntu 18.04 LTS: sqlite3 3.22.0-1ubuntu0.1
  Ubuntu 16.04 LTS: sqlite3 3.11.0-1ubuntu1.2
  Ubuntu 14.04 ESM: sqlite3 3.8.2-1ubuntu2.2+esm1
  Ubuntu 12.04 ESM: sqlite3 3.7.9-2ubuntu1.3
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides an application vulnerability patch. The technology watch team tracks security threats targeting the computer system.