CVE-2021-20227
moderate-risk
Published 2021-03-23
A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.
Do I need to act?
-
0.21% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (8)
References (16)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1924886
Third Party Advisory
https://security.gentoo.org/glsa/202103-04
Third Party Advisory
https://security.gentoo.org/glsa/202210-40
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210423-0010/
Release Notes
https://www.sqlite.org/releaselog/3_34_1.html
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1924886
Third Party Advisory
https://security.gentoo.org/glsa/202103-04
Third Party Advisory
https://security.gentoo.org/glsa/202210-40
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210423-0010/
Release Notes
https://www.sqlite.org/releaselog/3_34_1.html
33
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
14/34 · Moderate