Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0232: Use After Free

0
Medium
VulnerabilityCVE-2024-0232cvecve-2024-0232
Published: Tue Jan 16 2024 (01/16/2024, 14:01:58 UTC)
Source: CVE Database V5

Description

A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:58:58 UTC

Technical Analysis

CVE-2024-0232 is a heap use-after-free vulnerability identified in the SQLite database engine, specifically within the jsonParseAddNodeArray() function in the sqlite3.c source file. This function is responsible for parsing JSON arrays within SQLite's JSON extension. The flaw arises when the function improperly manages memory, leading to a use-after-free condition on the heap. An attacker with local access can exploit this by crafting malicious JSON input that triggers the vulnerability during parsing. Successful exploitation results in a crash of the SQLite process, causing denial of service (DoS). The vulnerability requires local access and user interaction, with a high attack complexity, meaning it is not trivial to exploit. There is no impact on confidentiality or integrity, as the flaw does not allow code execution or data manipulation beyond causing a crash. No known public exploits or patches have been reported at the time of disclosure. The CVSS v3.1 base score is 4.7, reflecting medium severity, with vector AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H. This indicates local attack vector, high complexity, no privileges required, user interaction needed, unchanged scope, no confidentiality or integrity impact, and high availability impact.

Potential Impact

The primary impact of CVE-2024-0232 is denial of service due to application crashes when processing malicious JSON input in SQLite. Organizations relying on SQLite for local data storage or embedded database functionality in applications that parse JSON data are at risk of service disruption. This can affect software stability, availability of services, and user experience. Since exploitation requires local access and user interaction, remote exploitation is unlikely, limiting the scope of impact. However, in environments where SQLite is embedded in critical local applications or services, repeated crashes could lead to operational downtime or loss of productivity. There is no direct risk of data breach or unauthorized data modification from this vulnerability. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits over time.

Mitigation Recommendations

To mitigate CVE-2024-0232, organizations should monitor for and apply official patches or updates from SQLite maintainers or their software vendors as soon as they become available. Until patches are released, restrict local access to systems running vulnerable SQLite versions to trusted users only. Implement strict input validation and sanitization for JSON data processed by SQLite to reduce the likelihood of malicious input triggering the vulnerability. Employ application-level error handling to gracefully manage parsing failures and prevent crashes. Consider running SQLite processes with least privilege and sandboxing techniques to limit the impact of potential crashes. Regularly audit and monitor application logs for unusual crashes or errors related to JSON parsing. Finally, educate users about the risks of opening or processing untrusted JSON data locally.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-01-04T12:11:09.709Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6920092a04dd2c5f9994c02f

Added to database: 11/21/2025, 6:39:38 AM

Last enriched: 2/28/2026, 10:58:58 AM

Last updated: 3/26/2026, 9:38:26 AM

Views: 153

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses