A vulnerability classified as critical was found in symisc UnQLite up to 957c377cb691a4f617db9aba5cc46d90425071e2. This vulnerability affects the function jx9MemObjStore of the file /data/src/benchmarks/unqlite/unqlite.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://vuldb.com/?id.305614 | vdb entry technical description |
https://vuldb.com/?ctiid.305614 | signature permissions required |
https://vuldb.com/?submit.554574 | third party advisory |
https://github.com/symisc/unqlite/issues/173 | issue tracking |
https://github.com/user-attachments/files/19652580/unqlite-reproduce-heap-overflow.zip | exploit |