Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-7104: CWE-122 Heap-based Buffer Overflow in SQLite SQLite3

0
Medium
VulnerabilityCVE-2023-7104cvecve-2023-7104cwe-122
Published: Mon Dec 25 2023 (12/25/2023, 21:00:05 UTC)
Source: CVE Database V5
Vendor/Project: SQLite
Product: SQLite3

Description

A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.

AI-Powered Analysis

AILast updated: 12/19/2025, 04:27:05 UTC

Technical Analysis

CVE-2023-7104 identifies a heap-based buffer overflow vulnerability in SQLite3, a widely used embedded database engine, affecting all versions up to 3.43.0. The vulnerability resides in the sessionReadRecord function of the sqlite3session extension (file ext/session/sqlite3session.c), which is responsible for reading session records used in database synchronization and change tracking. The flaw arises from improper handling of input data leading to a heap overflow condition, classified under CWE-122. Exploitation requires an attacker to have low-level privileges and network access (AV:A, PR:L), but does not require user interaction (UI:N). Successful exploitation could lead to partial compromise of confidentiality, integrity, and availability of the affected system, such as unauthorized data disclosure, data corruption, or application crashes. The vulnerability has a CVSS v3.1 base score of 5.5, indicating medium severity. No public exploits or active exploitation campaigns have been reported to date. The recommended remediation is to apply patches provided by SQLite once available or upgrade to a fixed version beyond 3.43.0. Due to SQLite’s extensive use in embedded systems, mobile devices, and various applications, the vulnerability has broad potential impact. However, exploitation complexity and required privileges limit immediate widespread risk.

Potential Impact

For European organizations, the impact of CVE-2023-7104 depends on the extent of SQLite3 usage, especially the sqlite3session extension, within their software stacks. Many enterprise applications, embedded devices, and mobile apps rely on SQLite for local data storage and synchronization. A successful exploit could lead to unauthorized data access, data integrity violations, or denial of service through application crashes. This could affect sectors such as finance, healthcare, telecommunications, and government where data confidentiality and integrity are critical. Additionally, embedded systems in industrial control or IoT devices using vulnerable SQLite versions could face operational disruptions. The medium severity and requirement for some privileges mean that internal threat actors or compromised network nodes could leverage this vulnerability to escalate attacks. European organizations with stringent data protection regulations (e.g., GDPR) must consider the risk of data breaches and operational impact. Failure to patch could also expose organizations to compliance and reputational risks.

Mitigation Recommendations

1. Apply official patches or upgrade SQLite3 to a version later than 3.43.0 as soon as they become available from the SQLite project. 2. Audit and inventory all applications and devices using SQLite3, focusing on those utilizing the sqlite3session extension. 3. Where patching is delayed, implement network segmentation and access controls to limit exposure of vulnerable systems, especially restricting access to services that invoke SQLite session handling. 4. Monitor application logs and system behavior for anomalies such as crashes or unexpected database errors that could indicate exploitation attempts. 5. Employ runtime protections such as heap overflow detection and memory safety tools where feasible. 6. Educate developers and system administrators about the vulnerability and encourage secure coding and update practices. 7. For embedded and IoT devices, coordinate with vendors to ensure timely firmware updates addressing this vulnerability. 8. Incorporate vulnerability scanning and management processes to detect outdated SQLite versions in the environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2023-12-25T14:00:48.991Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092613fe7723195e0b3015

Added to database: 11/3/2025, 10:00:51 PM

Last enriched: 12/19/2025, 4:27:05 AM

Last updated: 2/7/2026, 1:36:00 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats