CVE-2023-47118
Heap buffer overflow in T64 codec decompression
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. A heap buffer overflow issue was discovered in ClickHouse server. An attacker could send a specially crafted payload to the native interface exposed by default on port 9000/tcp, triggering a bug in the decompression logic of T64 codec that crashes the ClickHouse server process. This attack does not require authentication. Note that this exploit can also be triggered via HTTP protocol, however, the attacker will need a valid credential as the HTTP authentication take places first. This issue has been fixed in version 23.10.2.13-stable, 23.9.4.11-stable, 23.8.6.16-lts and 23.3.16.7-lts.
ClickHouse® es un sistema de gestión de bases de datos orientado a columnas de código abierto que permite generar informes de datos analíticos en tiempo real. Se descubrió un problema de desbordamiento de búfer de almacenamiento dinámico en el servidor ClickHouse. Un atacante podría enviar un payload especialmente manipulado a la interfaz nativa expuesta de forma predeterminada en el puerto 9000/tcp, lo que desencadenaría un error en la lógica de descompresión del códec T64 que bloquearía el proceso del servidor ClickHouse. Este ataque no requiere autenticación. Tenga en cuenta que esta explotación también se puede activar a través del protocolo HTTP; sin embargo, el atacante necesitará unas credenciales válidas ya que la autenticación HTTP se realiza primero. Este problema se solucionó en la versión 23.10.2.13-stable, 23.9.4.11-stable, 23.8.6.16-lts y 23.3.16.7-lts.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-10-30 CVE Reserved
- 2023-12-20 CVE Published
- 2024-08-02 CVE Updated
- 2024-11-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-122: Heap-based Buffer Overflow
- CWE-787: Out-of-bounds Write
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-g22g-p6q2-x39v | 2024-01-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Clickhouse Search vendor "Clickhouse" | Clickhouse Search vendor "Clickhouse" for product "Clickhouse" | >= 23.3 < 23.3.16.7 Search vendor "Clickhouse" for product "Clickhouse" and version " >= 23.3 < 23.3.16.7" | lts |
Affected
| ||||||
Clickhouse Search vendor "Clickhouse" | Clickhouse Search vendor "Clickhouse" for product "Clickhouse" | >= 23.8 < 23.8.6.16 Search vendor "Clickhouse" for product "Clickhouse" and version " >= 23.8 < 23.8.6.16" | lts |
Affected
| ||||||
Clickhouse Search vendor "Clickhouse" | Clickhouse Search vendor "Clickhouse" for product "Clickhouse" | >= 23.9 < 23.9.4.11 Search vendor "Clickhouse" for product "Clickhouse" and version " >= 23.9 < 23.9.4.11" | - |
Affected
| ||||||
Clickhouse Search vendor "Clickhouse" | Clickhouse Search vendor "Clickhouse" for product "Clickhouse" | >= 23.10 < 23.10.2.13 Search vendor "Clickhouse" for product "Clickhouse" and version " >= 23.10 < 23.10.2.13" | - |
Affected
| ||||||
Clickhouse Search vendor "Clickhouse" | Clickhouse Cloud Search vendor "Clickhouse" for product "Clickhouse Cloud" | < 23.9.2.47475 Search vendor "Clickhouse" for product "Clickhouse Cloud" and version " < 23.9.2.47475" | - |
Affected
|