18 results (0.007 seconds)

CVSS: 2.4EPSS: 0%CPEs: 2EXPL: 0

ClickHouse is an open-source column-oriented database management system. A bug exists in the cloud ClickHouse offering prior to version 24.0.2.54535 and in github.com/clickhouse/clickhouse version 23.1. Query caching bypasses the role based access controls and the policies being enforced on roles. In affected versions, the query cache only respects separate users, however this is not documented and not expected behavior. People relying on ClickHouse roles can have their access control lists bypassed if they are using query caching. • https://github.com/ClickHouse/ClickHouse/blob/bd17ee769e337906c4b1f404861e042ad72fcbfc/src/Interpreters/executeQuery.cpp#L1013-L1015 https://github.com/ClickHouse/ClickHouse/pull/58611 https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-45h5-f7g3-gr8r • CWE-863: Incorrect Authorization •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send a crafted HTTP request to the HTTP Endpoint (usually listening on port 8123 by default), causing a heap-based buffer overflow that crashes the process. This does not require authentication. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19. Se descubrió un problema en ClickHouse antes del 22.9.1.2603. • https://clickhouse.com/docs/en/whats-new/security-changelog • CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

An issue was discovered in ClickHouse before 22.9.1.2603. An authenticated user (with the ability to load data) could cause a heap buffer overflow and crash the server by inserting a malformed CapnProto object. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19. Se descubrió un problema en ClickHouse antes del 22.9.1.2603. Un usuario autenticado (con la capacidad de cargar datos) podría provocar un desbordamiento del búfer del heap y bloquear el servidor al insertar un objeto CapnProto con formato incorrecto. • https://clickhouse.com • CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

Divide-by-zero in Clickhouse's Gorilla compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0. Una división por cero en el códec de compresión Gorilla de Clickhouse cuando es analizada una consulta maliciosa. El primer byte del búfer comprimido es usado en una operación de módulo sin que sea comprobado el 0 • https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms • CWE-369: Divide By Zero •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

Divide-by-zero in Clickhouse's DeltaDouble compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0. Una división por cero en el códec de compresión DeltaDouble de Clickhouse cuando es analizada una consulta maliciosa. El primer byte del búfer comprimido es usado en una operación de módulo sin que sea comprobado el 0 • https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms • CWE-369: Divide By Zero •