Vulnerability Name: | CVE-2018-20505 (CCN-156018) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2018-12-26 | ||||||||||||||||||||||||||||||||||||
Published: | 2019-01-22 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-06-19 | ||||||||||||||||||||||||||||||||||||
Summary: | SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-89 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-20505 Source: MISC Type: Mailing List, Third Party Advisory http://seclists.org/fulldisclosure/2019/Jan/62 Source: MISC Type: Mailing List, Third Party Advisory http://seclists.org/fulldisclosure/2019/Jan/64 Source: MISC Type: Mailing List, Third Party Advisory http://seclists.org/fulldisclosure/2019/Jan/66 Source: MISC Type: Mailing List, Third Party Advisory http://seclists.org/fulldisclosure/2019/Jan/67 Source: MISC Type: Mailing List, Third Party Advisory http://seclists.org/fulldisclosure/2019/Jan/68 Source: MISC Type: Mailing List, Third Party Advisory http://seclists.org/fulldisclosure/2019/Jan/69 Source: MISC Type: Third Party Advisory, VDB Entry http://www.securityfocus.com/bid/106698 Source: XF Type: UNKNOWN apple-icloud-cve201820505-code-exec(156018) Source: MISC Type: Mailing List, Third Party Advisory https://seclists.org/bugtraq/2019/Jan/28 Source: MISC Type: Mailing List, Third Party Advisory https://seclists.org/bugtraq/2019/Jan/29 Source: MISC Type: Mailing List, Third Party Advisory https://seclists.org/bugtraq/2019/Jan/31 Source: MISC Type: Mailing List, Third Party Advisory https://seclists.org/bugtraq/2019/Jan/32 Source: MISC Type: Mailing List, Third Party Advisory https://seclists.org/bugtraq/2019/Jan/33 Source: MISC Type: Mailing List, Third Party Advisory https://seclists.org/bugtraq/2019/Jan/39 Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20190502-0004/ Source: MISC Type: Exploit, Vendor Advisory https://sqlite.org/src/info/1a84668dcfdebaf12415d Source: CCN Type: Apple security document HT209450 About the security content of iTunes 12.9.3 for Windows Source: CCN Type: Apple security document HT209451 About the security content of iCloud for Windows 7.10 Source: MISC Type: Vendor Advisory https://support.apple.com/kb/HT209443 Source: MISC Type: Vendor Advisory https://support.apple.com/kb/HT209446 Source: MISC Type: Vendor Advisory https://support.apple.com/kb/HT209447 Source: MISC Type: Vendor Advisory https://support.apple.com/kb/HT209448 Source: MISC Type: Vendor Advisory https://support.apple.com/kb/HT209450 Source: MISC Type: Vendor Advisory https://support.apple.com/kb/HT209451 Source: UBUNTU Type: UNKNOWN USN-4019-1 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |