9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
34.6%
ClickHouse® is an open-source column-oriented database management system
that allows generating analytical data reports in real-time. A heap buffer
overflow issue was discovered in ClickHouse server. An attacker could send
a specially crafted payload to the native interface exposed by default on
port 9000/tcp, triggering a bug in the decompression logic of T64 codec
that crashes the ClickHouse server process. This attack does not require
authentication. Note that this exploit can also be triggered via HTTP
protocol, however, the attacker will need a valid credential as the HTTP
authentication take places first. This issue has been fixed in version
23.10.2.13-stable, 23.9.4.11-stable, 23.8.6.16-lts and 23.3.16.7-lts.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | clickhouse | < any | UNKNOWN |
ubuntu | 23.10 | noarch | clickhouse | < any | UNKNOWN |
ubuntu | 24.04 | noarch | clickhouse | < any | UNKNOWN |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
34.6%