Researchers at Check Point Software Technologies have developed a new technique that shows how attackers can trigger and exploit a wide range of memory safety issues in the SQLite engine using nothing other than the language. It is the first research to show how queries can be modified and used to execute malicious commands in applications that use SQLite to store data. The research shows that querying a database may not be as safe as assumed, Check Point researcher Omer Gull said. The boundaries of what constitutes trusted and untrusted SQL input need to be revisited, he said.”]

