CVE-2022-35737
High
|7.5Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to potentially crash the SQLite application or execute arbitrary code by sending an extremely large string to a specific function. It can be exploited if the application uses vulnerable versions of SQLite and does not properly validate the size of the input it receives.
Technical Description
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactNone
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade FPatched in 1290 days
Quick Information
Published
Aug 3, 2022
over 3 years ago
Last Modified
Feb 13, 2026
7 days ago
Vendor
sqlite
Product
sqlite