{"id":"BIT-sqlite-2025-3277","details":"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.","aliases":["CVE-2025-3277"],"modified":"2025-04-16T08:27:21.461103Z","published":"2025-04-16T07:42:43.650Z","database_specific":{"severity":"Medium","cpes":["cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3277"},{"type":"WEB","url":"https://sqlite.org/src/info/498e3f1cf57f164f"}],"affected":[{"package":{"name":"sqlite","ecosystem":"Bitnami","purl":"pkg:bitnami/sqlite"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/sqlite/BIT-sqlite-2025-3277.json"},"severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"}]}],"schema_version":"1.7.3"}