{"id":"CVE-2018-20346","details":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.","modified":"2026-04-16T01:43:27.931221883Z","published":"2018-12-21T21:29:00.243Z","related":["SUSE-SU-2019:0788-1","SUSE-SU-2019:0913-1","SUSE-SU-2019:0973-1","SUSE-SU-2019:14003-1","SUSE-SU-2021:3215-1","openSUSE-SU-2019:1159-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","extracted_events":[{"fixed":"71.0.3578.80"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"15.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"42.3"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"6.0"}],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/"},{"type":"WEB","url":"https://support.apple.com/HT209443"},{"type":"WEB","url":"https://support.apple.com/HT209446"},{"type":"WEB","url":"https://support.apple.com/HT209447"},{"type":"WEB","url":"https://support.apple.com/HT209448"},{"type":"WEB","url":"https://support.apple.com/HT209450"},{"type":"WEB","url":"https://support.apple.com/HT209451"},{"type":"WEB","url":"https://usn.ubuntu.com/4019-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/4019-2/"},{"type":"WEB","url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106323"},{"type":"ADVISORY","url":"https://access.redhat.com/articles/3758321"},{"type":"ADVISORY","url":"https://blade.tencent.com/magellan/index_en.html"},{"type":"ADVISORY","url":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"},{"type":"ADVISORY","url":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html"},{"type":"ADVISORY","url":"https://news.ycombinator.com/item?id=18685296"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201904-21"},{"type":"ADVISORY","url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc"},{"type":"ADVISORY","url":"https://www.sqlite.org/releaselog/3_25_3.html"},{"type":"ADVISORY","url":"https://www.synology.com/security/advisory/Synology_SA_18_61"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677"},{"type":"REPORT","url":"https://crbug.com/900910"},{"type":"FIX","url":"https://sqlite.org/src/info/940f2adc8541a838"},{"type":"FIX","url":"https://sqlite.org/src/info/d44318f59044162e"},{"type":"EVIDENCE","url":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html"},{"type":"EVIDENCE","url":"https://worthdoingbadly.com/sqlitebug/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sqlite/sqlite","events":[{"introduced":"0"},{"fixed":"ea6eb55ebe6d6e427f3dc908ecc7ced8529adf10"}],"database_specific":{"cpe":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"3.25.3"}],"source":"CPE_FIELD"}}],"versions":["version-1.0","version-1.0.1","version-1.0.10","version-1.0.12","version-1.0.13","version-1.0.14","version-1.0.15","version-1.0.16","version-1.0.17","version-1.0.18","version-1.0.19","version-1.0.20","version-1.0.21","version-1.0.22","version-1.0.23","version-1.0.24","version-1.0.25","version-1.0.26","version-1.0.27","version-1.0.28","version-1.0.29","version-1.0.3","version-1.0.30","version-1.0.31","version-1.0.32","version-1.0.4","version-1.0.5","version-1.0.8","version-1.0.9","version-2.0.0","version-2.0.1","version-2.0.2","version-2.0.3","version-2.0.4","version-2.0.5","version-2.0.6","version-2.0.7","version-2.0.8","version-2.1.0","version-2.1.1","version-2.1.2","version-2.1.3","version-2.1.4","version-2.1.5","version-2.1.6","version-2.1.7","version-2.2.0","version-2.2.1","version-2.2.2","version-2.2.3","version-2.2.4","version-2.2.5","version-2.3.0","version-2.3.1","version-2.3.2","version-2.3.3","version-2.4.0","version-2.4.1","version-2.4.10","version-2.4.11","version-2.4.12","version-2.4.2","version-2.4.3","version-2.4.4","version-2.4.5","version-2.4.6","version-2.4.7","version-2.4.8","version-2.4.9","version-2.5.0","version-2.5.1","version-2.5.2","version-2.5.3","version-2.5.4","version-2.5.5","version-2.5.6","version-2.6.0","version-2.6.1","version-2.6.2","version-2.6.3","version-2.7.0","version-2.7.1","version-2.7.2","version-2.7.3","version-2.7.4","version-2.7.5","version-2.7.6","version-2.8.0","version-2.8.1","version-2.8.10","version-2.8.11","version-2.8.12","version-2.8.13","version-2.8.2","version-2.8.3","version-2.8.4","version-2.8.5","version-2.8.6","version-2.8.7","version-2.8.8","version-2.8.9","version-3.0.0","version-3.0.1","version-3.0.2","version-3.0.3","version-3.0.4","version-3.0.5","version-3.0.6","version-3.0.7","version-3.0.8","version-3.1.0","version-3.1.1","version-3.1.2","version-3.1.3","version-3.1.3.1","version-3.1.4","version-3.1.5","version-3.1.6","version-3.10.0","version-3.11.0","version-3.12.0","version-3.13.0","version-3.14.0","version-3.15.0","version-3.16.0","version-3.2.0","version-3.2.1","version-3.2.2","version-3.2.3","version-3.2.4","version-3.2.5","version-3.2.6","version-3.2.7","version-3.22.0","version-3.23.0","version-3.23.1","version-3.24.0","version-3.25.0","version-3.25.1","version-3.25.2","version-3.3.0","version-3.3.1","version-3.3.10","version-3.3.11","version-3.3.12","version-3.3.13","version-3.3.14","version-3.3.15","version-3.3.16","version-3.3.17","version-3.3.2","version-3.3.3","version-3.3.4","version-3.3.5","version-3.3.6","version-3.3.7","version-3.3.8","version-3.3.9","version-3.4.0","version-3.4.1","version-3.4.2","version-3.5.0","version-3.5.1","version-3.5.2","version-3.5.3","version-3.5.4","version-3.5.5","version-3.5.6","version-3.5.7","version-3.5.8","version-3.5.9","version-3.6.0","version-3.6.1","version-3.6.10","version-3.6.11","version-3.6.12","version-3.6.13","version-3.6.14","version-3.6.15","version-3.6.16","version-3.6.17","version-3.6.18","version-3.6.19","version-3.6.2","version-3.6.20","version-3.6.21","version-3.6.22","version-3.6.23","version-3.6.3","version-3.6.4","version-3.6.5","version-3.6.6","version-3.6.7","version-3.6.8","version-3.6.9","version-3.7.0","version-3.7.1","version-3.7.10","version-3.7.11","version-3.7.12","version-3.7.12.1","version-3.7.13","version-3.7.14","version-3.7.15","version-3.7.16","version-3.7.16.1","version-3.7.17","version-3.7.2","version-3.7.3","version-3.7.4","version-3.7.5","version-3.7.6","version-3.7.6.1","version-3.7.7","version-3.7.8","version-3.7.9","version-3.8.0","version-3.8.1","version-3.8.10","version-3.8.10.1","version-3.8.11","version-3.8.11.1","version-3.8.2","version-3.8.3","version-3.8.4","version-3.8.4.1","version-3.8.5","version-3.8.6","version-3.8.7","version-3.8.8","version-3.8.9","version-3.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-20346.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}