CVE-2022-35737

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to potentially crash the SQLite application or execute arbitrary code by sending an extremely large string to a specific function. It can be exploited if the application uses vulnerable versions of SQLite and does not properly validate the size of the input it receives.

Technical Description

SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactNone
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade FPatched in 1290 days

Quick Information

Published

Aug 3, 2022

over 3 years ago

Last Modified

Feb 13, 2026

7 days ago

Vendor

sqlite

Product

sqlite