Search for vulnerabilities
Vulnerability details: VCID-8b27-d396-aaak
Vulnerability ID VCID-8b27-d396-aaak
Aliases CVE-2018-20506
Summary SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.
Status Published
Exploitability 0.5
Weighted Severity 7.3
Risk 3.6
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20506.html
cvssv3 7.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20506.json
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01303 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01828 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01828 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01828 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.01828 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.13734 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.17974 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.17974 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.17974 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.17974 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.17974 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.17974 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.17974 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.17974 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.17974 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.17974 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
epss 0.21977 https://api.first.org/data/v1/epss?cve=CVE-2018-20506
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506
generic_textual Medium http://seclists.org/fulldisclosure/2019/Jan/62
generic_textual Medium http://seclists.org/fulldisclosure/2019/Jan/64
generic_textual Medium http://seclists.org/fulldisclosure/2019/Jan/66
generic_textual Medium http://seclists.org/fulldisclosure/2019/Jan/67
generic_textual Medium http://seclists.org/fulldisclosure/2019/Jan/68
generic_textual Medium http://seclists.org/fulldisclosure/2019/Jan/69
cvssv3 7 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2018-20506
cvssv3 8.1 https://nvd.nist.gov/vuln/detail/CVE-2018-20506
generic_textual Medium https://seclists.org/bugtraq/2019/Jan/28
generic_textual Medium https://seclists.org/bugtraq/2019/Jan/29
generic_textual Medium https://seclists.org/bugtraq/2019/Jan/31
generic_textual Medium https://seclists.org/bugtraq/2019/Jan/32
generic_textual Medium https://seclists.org/bugtraq/2019/Jan/33
generic_textual Medium https://seclists.org/bugtraq/2019/Jan/39
generic_textual Medium https://sqlite.org/src/info/940f2adc8541a838
generic_textual Medium https://support.apple.com/kb/HT209443
generic_textual Medium https://support.apple.com/kb/HT209446
generic_textual Medium https://support.apple.com/kb/HT209447
generic_textual Medium https://support.apple.com/kb/HT209448
generic_textual Medium https://support.apple.com/kb/HT209450
generic_textual Medium https://support.apple.com/kb/HT209451
generic_textual Low https://ubuntu.com/security/notices/USN-4019-1
generic_textual Medium https://ubuntu.com/security/notices/USN-4019-2
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuapr2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuapr2020.html
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20506.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20506.json
https://api.first.org/data/v1/epss?cve=CVE-2018-20506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506
http://seclists.org/fulldisclosure/2019/Jan/62
http://seclists.org/fulldisclosure/2019/Jan/64
http://seclists.org/fulldisclosure/2019/Jan/66
http://seclists.org/fulldisclosure/2019/Jan/67
http://seclists.org/fulldisclosure/2019/Jan/68
http://seclists.org/fulldisclosure/2019/Jan/69
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://seclists.org/bugtraq/2019/Jan/28
https://seclists.org/bugtraq/2019/Jan/29
https://seclists.org/bugtraq/2019/Jan/31
https://seclists.org/bugtraq/2019/Jan/32
https://seclists.org/bugtraq/2019/Jan/33
https://seclists.org/bugtraq/2019/Jan/39
https://security.netapp.com/advisory/ntap-20190502-0004/
https://sqlite.org/src/info/940f2adc8541a838
https://support.apple.com/kb/HT209443
https://support.apple.com/kb/HT209446
https://support.apple.com/kb/HT209447
https://support.apple.com/kb/HT209448
https://support.apple.com/kb/HT209450
https://support.apple.com/kb/HT209451
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
http://www.securityfocus.com/bid/106698
cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
CVE-2018-20506 https://nvd.nist.gov/vuln/detail/CVE-2018-20506
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20506.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-20506
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-20506
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuapr2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.86287
EPSS Score 0.01303
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.