An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
                
            References
                    | Link | Resource | 
|---|---|
| https://sqlite.org/src/info/498e3f1cf57f164f | Patch | 
Configurations
                    History
                    01 Aug 2025, 18:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://sqlite.org/src/info/498e3f1cf57f164f - Patch | |
| First Time | Sqlite Sqlite sqlite | |
| CWE | CWE-190 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| CPE | cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:* | 
15 Apr 2025, 18:39
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
14 Apr 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-04-14 17:15
Updated : 2025-08-18 21:28
NVD link : CVE-2025-3277
Mitre link : CVE-2025-3277
CVE.ORG link : CVE-2025-3277
JSON object : View
Products Affected
                sqlite
- sqlite
