// For flags

CVE-2023-47118

Heap buffer overflow in T64 codec decompression

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. A heap buffer overflow issue was discovered in ClickHouse server. An attacker could send a specially crafted payload to the native interface exposed by default on port 9000/tcp, triggering a bug in the decompression logic of T64 codec that crashes the ClickHouse server process. This attack does not require authentication. Note that this exploit can also be triggered via HTTP protocol, however, the attacker will need a valid credential as the HTTP authentication take places first. This issue has been fixed in version 23.10.2.13-stable, 23.9.4.11-stable, 23.8.6.16-lts and 23.3.16.7-lts.

ClickHouse® es un sistema de gestión de bases de datos orientado a columnas de código abierto que permite generar informes de datos analíticos en tiempo real. Se descubrió un problema de desbordamiento de búfer de almacenamiento dinámico en el servidor ClickHouse. Un atacante podría enviar un payload especialmente manipulado a la interfaz nativa expuesta de forma predeterminada en el puerto 9000/tcp, lo que desencadenaría un error en la lógica de descompresión del códec T64 que bloquearía el proceso del servidor ClickHouse. Este ataque no requiere autenticación. Tenga en cuenta que esta explotación también se puede activar a través del protocolo HTTP; sin embargo, el atacante necesitará unas credenciales válidas ya que la autenticación HTTP se realiza primero. Este problema se solucionó en la versión 23.10.2.13-stable, 23.9.4.11-stable, 23.8.6.16-lts y 23.3.16.7-lts.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-10-30 CVE Reserved
  • 2023-12-20 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-11-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-122: Heap-based Buffer Overflow
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Clickhouse
Search vendor "Clickhouse"
Clickhouse
Search vendor "Clickhouse" for product "Clickhouse"
>= 23.3 < 23.3.16.7
Search vendor "Clickhouse" for product "Clickhouse" and version " >= 23.3 < 23.3.16.7"
lts
Affected
Clickhouse
Search vendor "Clickhouse"
Clickhouse
Search vendor "Clickhouse" for product "Clickhouse"
>= 23.8 < 23.8.6.16
Search vendor "Clickhouse" for product "Clickhouse" and version " >= 23.8 < 23.8.6.16"
lts
Affected
Clickhouse
Search vendor "Clickhouse"
Clickhouse
Search vendor "Clickhouse" for product "Clickhouse"
>= 23.9 < 23.9.4.11
Search vendor "Clickhouse" for product "Clickhouse" and version " >= 23.9 < 23.9.4.11"
-
Affected
Clickhouse
Search vendor "Clickhouse"
Clickhouse
Search vendor "Clickhouse" for product "Clickhouse"
>= 23.10 < 23.10.2.13
Search vendor "Clickhouse" for product "Clickhouse" and version " >= 23.10 < 23.10.2.13"
-
Affected
Clickhouse
Search vendor "Clickhouse"
Clickhouse Cloud
Search vendor "Clickhouse" for product "Clickhouse Cloud"
< 23.9.2.47475
Search vendor "Clickhouse" for product "Clickhouse Cloud" and version " < 23.9.2.47475"
-
Affected