The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of SQLite: integer overflow via sqlite3_str_vappendf

Synthesis of the vulnerability 

An attacker can trigger an integer overflow via sqlite3_str_vappendf() of SQLite, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Fedora, FreeBSD, Oracle Communications, SQLite, Ubuntu.
Severity of this bulletin: 2/4.
Creation date: 25/05/2020.
Références of this threat: cpujul2020, CVE-2020-13434, DLA-2221-1, FEDORA-2020-0477f8840e, FreeBSD-SA-20:22.sqlite, USN-4394-1, VIGILANCE-VUL-32337.

Description of the vulnerability 

An attacker can trigger an integer overflow via sqlite3_str_vappendf() of SQLite, in order to trigger a denial of service, and possibly to run code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This weakness announce impacts software or systems such as Debian, Fedora, FreeBSD, Oracle Communications, SQLite, Ubuntu.

Our Vigil@nce team determined that the severity of this vulnerability alert is medium.

The trust level is of type confirmed by the editor, with an origin of user account.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this computer threat announce.

Solutions for this threat 

SQLite: version 3.32.1.
The version 3.32.1 is fixed:
  https://www.sqlite.org/2020/sqlite-amalgamation-3320100.zip

SQLite: patch for sqlite3_str_vappendf.
A patch is indicated in information sources.

Debian 8: new sqlite3 packages.
New packages are available:
  Debian 8: sqlite3 3.8.7.1-1+deb8u6

Fedora 32: new sqlite packages.
New packages are available:
  Fedora 32: sqlite 3.32.1-1.fc32

FreeBSD: patch for sqlite3.
A patch is available:
  https://security.FreeBSD.org/patches/SA-20:22/sqlite.12.1.patch
  https://security.FreeBSD.org/patches/SA-20:22/sqlite.11.4.patch
  https://security.FreeBSD.org/patches/SA-20:22/sqlite.11.3.patch

Oracle Communications: CPU of July 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2681987.1
  https://support.oracle.com/rs?type=doc&id=2682459.1
  https://support.oracle.com/rs?type=doc&id=2682014.1
  https://support.oracle.com/rs?type=doc&id=2683787.1
  https://support.oracle.com/rs?type=doc&id=2683788.1
  https://support.oracle.com/rs?type=doc&id=2683789.1
  https://support.oracle.com/rs?type=doc&id=2682045.1
  https://support.oracle.com/rs?type=doc&id=2683831.1
  https://support.oracle.com/rs?type=doc&id=2682010.1
  https://support.oracle.com/rs?type=doc&id=2683832.1
  https://support.oracle.com/rs?type=doc&id=2682500.1
  https://support.oracle.com/rs?type=doc&id=2683241.1
  https://support.oracle.com/rs?type=doc&id=2682011.1
  https://support.oracle.com/rs?type=doc&id=2683840.1
  https://support.oracle.com/rs?type=doc&id=2682018.1
  https://support.oracle.com/rs?type=doc&id=2683841.1
  https://support.oracle.com/rs?type=doc&id=2683842.1
  https://support.oracle.com/rs?type=doc&id=2683843.1
  https://support.oracle.com/rs?type=doc&id=2683845.1

Ubuntu: new sqlite3 packages.
New packages are available:
  Ubuntu 20.04 LTS: sqlite3 3.31.1-4ubuntu0.1
  Ubuntu 19.10: sqlite3 3.29.0-2ubuntu0.3
  Ubuntu 18.04 LTS: sqlite3 3.22.0-1ubuntu0.4
  Ubuntu 16.04 LTS: sqlite3 3.11.0-1ubuntu1.5

Wind River Linux: version 10.18.44.18.
The version 10.18.44.18 is fixed:
  https://support2.windriver.com/
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a systems vulnerabilities watch. The technology watch team tracks security threats targeting the computer system.