CVE-2021-42387
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As part of the LZ4::decompressImpl() loop, a 16-bit unsigned user-supplied value ('offset') is read from the compressed data. The offset is later used in the length of a copy operation, without checking the upper bounds of the source of the copy operation.
Una lectura fuera de límites de la pila en el códec de compresión LZ4 de Clickhouse cuando es analizada una consulta maliciosa. Como parte del bucle LZ4::decompressImpl(), es leído un valor de 16 bits sin signo proporcionado por el usuario ("offset") de los datos comprimidos. El offset es usado posteriormente en la longitud de una operación de copia, sin comprobar los límites superiores del origen de la operación de copia
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-10-14 CVE Reserved
- 2022-03-14 CVE Published
- 2024-06-17 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/11/msg00002.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Yandex Search vendor "Yandex" | Clickhouse Search vendor "Yandex" for product "Clickhouse" | < 21.10.2.15 Search vendor "Yandex" for product "Clickhouse" and version " < 21.10.2.15" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|