CVE-2021-20227

A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_for_oracle_database:13.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

History

21 Nov 2024, 05:46

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1924886 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1924886 - Issue Tracking, Third Party Advisory
References () https://security.gentoo.org/glsa/202103-04 - Third Party Advisory () https://security.gentoo.org/glsa/202103-04 - Third Party Advisory
References () https://security.gentoo.org/glsa/202210-40 - Third Party Advisory () https://security.gentoo.org/glsa/202210-40 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20210423-0010/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210423-0010/ - Third Party Advisory
References () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuApr2021.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuApr2021.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory
References () https://www.sqlite.org/releaselog/3_34_1.html - Release Notes, Vendor Advisory () https://www.sqlite.org/releaselog/3_34_1.html - Release Notes, Vendor Advisory

Information

Published : 2021-03-23 17:15

Updated : 2024-11-21 05:46


NVD link : CVE-2021-20227

Mitre link : CVE-2021-20227

CVE.ORG link : CVE-2021-20227


JSON object : View

Products Affected

oracle

  • outside_in_technology
  • mysql_workbench
  • enterprise_manager_for_oracle_database
  • jd_edwards_enterpriseone_tools
  • communications_network_charging_and_control
  • zfs_storage_appliance_kit

sqlite

  • sqlite
CWE
CWE-416

Use After Free