The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of SQLite: denial of service via RenameTokenCheckAll

Synthesis of the vulnerability 

An attacker can trigger a fatal error via RenameTokenCheckAll of SQLite, in order to trigger a denial of service.
Impacted products: Solaris, SQLite.
Severity of this bulletin: 1/4.
Creation date: 10/04/2020.
Références of this threat: CVE-2020-11656, VIGILANCE-VUL-31995.

Description of the vulnerability 

An attacker can trigger a fatal error via RenameTokenCheckAll of SQLite, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This security note impacts software or systems such as Solaris, SQLite.

Our Vigil@nce team determined that the severity of this threat announce is low.

The trust level is of type confirmed by the editor, with an origin of user account.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this computer weakness announce.

Solutions for this threat 

SQLite: patch for RenameTokenCheckAll.
A patch is indicated in information sources.

Oracle Solaris: patch for third party software of April 2020 v3.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Wind River Linux: version 10.19.45.7.
The version 10.19.45.7 is fixed:
  https://support2.windriver.com/
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerability watch. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.