
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability (CVE-2023-7104) was discovered in SQLite SQLite3 versions up to 3.43.0. The vulnerability affects the sessionReadRecord function in the ext/session/sqlite3session.c file of the make alltest Handler component. This heap-based buffer overflow vulnerability was discovered in September 2023 and publicly disclosed in December 2023 (SQLite Forum, NVD).
The vulnerability stems from insufficient validation of the pIn->iNext parameter when reading aVal in the sessionReadRecord function. When processing certain data types (SQLITEINTEGER or SQLITEFLOAT), the code attempts to read an 8-byte region from pIn->aData[pIn->iNext] without properly validating buffer boundaries, potentially leading to a heap buffer overflow. The vulnerability has a CVSS v3.1 base score of 7.3 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L (NVD).
Successful exploitation of this vulnerability could lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The vulnerability affects various products that incorporate SQLite, including certain versions of database management systems and applications (NetApp Advisory).
The vulnerability was patched in SQLite with commit 0e4e7a05c4204b47, which adds proper validation of buffer boundaries before attempting to read 8-byte values. The fix involves checking if (pIn->nData-pIn->iNext)<8 before proceeding with the read operation (SQLite Patch). Users are recommended to upgrade to a patched version of SQLite.
The SQLite development team responded promptly to the vulnerability report, implementing a fix within the same day it was reported. However, as per their policy detailed at sqlite.org/cves.html, they do not participate in the CVE system directly, leaving it to security researchers to handle CVE registration (SQLite Forum).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."