
CVE-2021-42391
https://notcve.org/view.php?id=CVE-2021-42391
14 Mar 2022 — Divide-by-zero in Clickhouse's Gorilla compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0. Una división por cero en el códec de compresión Gorilla de Clickhouse cuando es analizada una consulta maliciosa. El primer byte del búfer comprimido es usado en una operación de módulo sin que sea comprobado el 0 • https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms • CWE-369: Divide By Zero •

CVE-2021-42390
https://notcve.org/view.php?id=CVE-2021-42390
14 Mar 2022 — Divide-by-zero in Clickhouse's DeltaDouble compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0. Una división por cero en el códec de compresión DeltaDouble de Clickhouse cuando es analizada una consulta maliciosa. El primer byte del búfer comprimido es usado en una operación de módulo sin que sea comprobado el 0 • https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms • CWE-369: Divide By Zero •

CVE-2021-42389
https://notcve.org/view.php?id=CVE-2021-42389
14 Mar 2022 — Divide-by-zero in Clickhouse's Delta compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0. Una división por cero en el códec de compresión Delta de Clickhouse cuando es analizada una consulta maliciosa. El primer byte del búfer comprimido es usado en una operación de módulo sin que sea comprobado el 0 • https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms • CWE-369: Divide By Zero •

CVE-2021-42387 – Ubuntu Security Notice USN-6933-1
https://notcve.org/view.php?id=CVE-2021-42387
14 Mar 2022 — Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As part of the LZ4::decompressImpl() loop, a 16-bit unsigned user-supplied value ('offset') is read from the compressed data. The offset is later used in the length of a copy operation, without checking the upper bounds of the source of the copy operation. Una lectura fuera de límites de la pila en el códec de compresión LZ4 de Clickhouse cuando es analizada una consulta maliciosa. Como parte del bucle LZ4::decompr... • https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms • CWE-125: Out-of-bounds Read •

CVE-2021-42388
https://notcve.org/view.php?id=CVE-2021-42388
14 Mar 2022 — Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As part of the LZ4::decompressImpl() loop, a 16-bit unsigned user-supplied value ('offset') is read from the compressed data. The offset is later used in the length of a copy operation, without checking the lower bounds of the source of the copy operation. Una lectura fuera de límites de la pila en el códec de compresión LZ4 de Clickhouse cuando es analizada una consulta maliciosa. Como parte del bucle LZ4::decompr... • https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms • CWE-125: Out-of-bounds Read •

CVE-2021-43304
https://notcve.org/view.php?id=CVE-2021-43304
14 Mar 2022 — Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy

CVE-2021-43305
https://notcve.org/view.php?id=CVE-2021-43305
14 Mar 2022 — Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy

CVE-2019-15024
https://notcve.org/view.php?id=CVE-2019-15024
30 Dec 2019 — In all versions of ClickHouse before 19.14.3, an attacker having write access to ZooKeeper and who is able to run a custom server available from the network where ClickHouse runs, can create a custom-built malicious server that will act as a ClickHouse replica and register it in ZooKeeper. When another replica will fetch data part from the malicious replica, it can force clickhouse-server to write to arbitrary path on filesystem. En todas las versiones de ClickHouse anteriores a la versión 19.14.3, un ataca... • https://clickhouse.yandex/docs/en/security_changelog •

CVE-2019-16535
https://notcve.org/view.php?id=CVE-2019-16535
30 Dec 2019 — In all versions of ClickHouse before 19.14, an OOB read, OOB write and integer underflow in decompression algorithms can be used to achieve RCE or DoS via native protocol. En todas las versiones de ClickHouse anteriores a la versión 19.14, una lectura OOB, escritura OOB y un desbordamiento de enteros en algoritmos de descompresión pueden ser usados para lograr una RCE o DoS por medio del protocolo nativo. • https://clickhouse.yandex/docs/en/security_changelog • CWE-125: Out-of-bounds Read CWE-191: Integer Underflow (Wrap or Wraparound) CWE-787: Out-of-bounds Write •

CVE-2019-18657
https://notcve.org/view.php?id=CVE-2019-18657
31 Oct 2019 — ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function. ClickHouse versiones anteriores a 19.13.5.44, permite una inyección de encabezado HTTP por medio de la función url table. • https://github.com/ClickHouse/ClickHouse/blob/master/CHANGELOG.md • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •