{"id":"CVE-2020-11655","details":"SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.","aliases":["BIT-sqlite-2020-11655"],"modified":"2026-04-11T12:24:17.141440Z","published":"2020-04-09T03:15:11.363Z","related":["CGA-m4qh-c5gh-j8c6","MGASA-2021-0303"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"introduced":"8.2.0"},{"last_affected":"8.2.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"},{"extracted_events":[{"introduced":"12.0.0"},{"last_affected":"12.0.3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"12.0.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6.0.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*"},{"extracted_events":[{"introduced":"8.2.0"},{"last_affected":"8.2.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"},{"extracted_events":[{"introduced":"8.2.0"},{"last_affected":"8.2.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"12.4.0.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"11.1.2.4"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"17.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"17.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"17.3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"8.5.4"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"8.5.5"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"8.8"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*"},{"extracted_events":[{"fixed":"1.0.1.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"},{"extracted_events":[{"fixed":"5.19.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"16.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"extracted_events":[{"last_affected":"18.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"extracted_events":[{"last_affected":"19.10"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"20.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"}]},"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"type":"ADVISORY","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202007-26"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200416-0001/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4394-1/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2021-14"},{"type":"FIX","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"type":"FIX","url":"https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11"},{"type":"EVIDENCE","url":"https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"527c12ed611f3fe072c3043734319edb2c733099"},{"last_affected":"ee4455a33b10f1b1886044322e4893f587b319ed"},{"last_affected":"ea1efa9822d81044b726aab20c857d5e1b7e046a"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"ee4455a33b10f1b1886044322e4893f587b319ed"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"8.0"},{"last_affected":"9.0"},{"last_affected":"8.0.22"},{"last_affected":"8.1"},{"introduced":"8.0.0"},{"last_affected":"8.0.22"}],"source":"CPE_FIELD","cpe":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*","cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"]}}],"versions":["mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-8.0.0","mysql-8.0.22","mysql-8.1.0","mysql-9.0.0","mysql-9.0.0-release","mysql-cluster-8.0.22","mysql-cluster-8.1.0","mysql-cluster-9.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-11655.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/sqlite/sqlite","events":[{"introduced":"0"},{"last_affected":"562fd18b9dc27216191c0a6477bba9b175f7f0d2"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"3.31.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"}}],"versions":["version-1.0","version-1.0.1","version-1.0.10","version-1.0.12","version-1.0.13","version-1.0.14","version-1.0.15","version-1.0.16","version-1.0.17","version-1.0.18","version-1.0.19","version-1.0.20","version-1.0.21","version-1.0.22","version-1.0.23","version-1.0.24","version-1.0.25","version-1.0.26","version-1.0.27","version-1.0.28","version-1.0.29","version-1.0.3","version-1.0.30","version-1.0.31","version-1.0.32","version-1.0.4","version-1.0.5","version-1.0.8","version-1.0.9","version-2.0.0","version-2.0.1","version-2.0.2","version-2.0.3","version-2.0.4","version-2.0.5","version-2.0.6","version-2.0.7","version-2.0.8","version-2.1.0","version-2.1.1","version-2.1.2","version-2.1.3","version-2.1.4","version-2.1.5","version-2.1.6","version-2.1.7","version-2.2.0","version-2.2.1","version-2.2.2","version-2.2.3","version-2.2.4","version-2.2.5","version-2.3.0","version-2.3.1","version-2.3.2","version-2.3.3","version-2.4.0","version-2.4.1","version-2.4.10","version-2.4.11","version-2.4.12","version-2.4.2","version-2.4.3","version-2.4.4","version-2.4.5","version-2.4.6","version-2.4.7","version-2.4.8","version-2.4.9","version-2.5.0","version-2.5.1","version-2.5.2","version-2.5.3","version-2.5.4","version-2.5.5","version-2.5.6","version-2.6.0","version-2.6.1","version-2.6.2","version-2.6.3","version-2.7.0","version-2.7.1","version-2.7.2","version-2.7.3","version-2.7.4","version-2.7.5","version-2.7.6","version-2.8.0","version-2.8.1","version-2.8.10","version-2.8.11","version-2.8.12","version-2.8.13","version-2.8.2","version-2.8.3","version-2.8.4","version-2.8.5","version-2.8.6","version-2.8.7","version-2.8.8","version-2.8.9","version-3.0.0","version-3.0.1","version-3.0.2","version-3.0.3","version-3.0.4","version-3.0.5","version-3.0.6","version-3.0.7","version-3.0.8","version-3.1.0","version-3.1.1","version-3.1.2","version-3.1.3","version-3.1.3.1","version-3.1.4","version-3.1.5","version-3.1.6","version-3.10.0","version-3.11.0","version-3.12.0","version-3.13.0","version-3.14.0","version-3.15.0","version-3.16.0","version-3.2.0","version-3.2.1","version-3.2.2","version-3.2.3","version-3.2.4","version-3.2.5","version-3.2.6","version-3.2.7","version-3.22.0","version-3.23.0","version-3.23.1","version-3.24.0","version-3.25.0","version-3.26.0","version-3.27.0","version-3.28.0","version-3.29.0","version-3.3.0","version-3.3.1","version-3.3.10","version-3.3.11","version-3.3.12","version-3.3.13","version-3.3.14","version-3.3.15","version-3.3.16","version-3.3.17","version-3.3.2","version-3.3.3","version-3.3.4","version-3.3.5","version-3.3.6","version-3.3.7","version-3.3.8","version-3.3.9","version-3.30.0","version-3.31.0","version-3.31.1","version-3.4.0","version-3.4.1","version-3.4.2","version-3.5.0","version-3.5.1","version-3.5.2","version-3.5.3","version-3.5.4","version-3.5.5","version-3.5.6","version-3.5.7","version-3.5.8","version-3.5.9","version-3.6.0","version-3.6.1","version-3.6.10","version-3.6.11","version-3.6.12","version-3.6.13","version-3.6.14","version-3.6.15","version-3.6.16","version-3.6.17","version-3.6.18","version-3.6.19","version-3.6.2","version-3.6.20","version-3.6.21","version-3.6.22","version-3.6.23","version-3.6.3","version-3.6.4","version-3.6.5","version-3.6.6","version-3.6.7","version-3.6.8","version-3.6.9","version-3.7.0","version-3.7.1","version-3.7.10","version-3.7.11","version-3.7.12","version-3.7.12.1","version-3.7.13","version-3.7.14","version-3.7.15","version-3.7.16","version-3.7.16.1","version-3.7.17","version-3.7.2","version-3.7.3","version-3.7.4","version-3.7.5","version-3.7.6","version-3.7.6.1","version-3.7.7","version-3.7.8","version-3.7.9","version-3.8.0","version-3.8.1","version-3.8.10","version-3.8.10.1","version-3.8.11","version-3.8.11.1","version-3.8.2","version-3.8.3","version-3.8.4","version-3.8.4.1","version-3.8.5","version-3.8.6","version-3.8.7","version-3.8.8","version-3.8.9","version-3.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-11655.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}