CVE-2023-47118

EUVD-2023-51261
ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. A heap buffer overflow issue was discovered in ClickHouse server. An attacker could send a specially crafted payload to the native interface exposed by default on port 9000/tcp, triggering a bug in the decompression logic of T64 codec that crashes the ClickHouse server process. This attack does not require authentication. Note that this exploit can also be triggered via HTTP protocol, however, the attacker will need a valid credential as the HTTP authentication take places first. This issue has been fixed in version 23.10.2.13-stable, 23.9.4.11-stable, 23.8.6.16-lts and 23.3.16.7-lts.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
GitHub_MCNA
7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 59%
Affected Products (NVD)
VendorProductVersion
clickhouseclickhouse
23.3 ≤
𝑥
< 23.3.16.7
clickhouseclickhouse
23.8 ≤
𝑥
< 23.8.6.16
clickhouseclickhouse
23.9 ≤
𝑥
< 23.9.4.11
clickhouseclickhouse
23.10 ≤
𝑥
< 23.10.2.13
clickhouseclickhouse_cloud
𝑥
< 23.9.2.47475
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
clickhouse
bookworm
18.16.1+ds-7.3
fixed
bullseye
18.16.1+ds-7.2+deb11u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
clickhouse
bionic
ignored
focal
needs-triage
jammy
dne
lunar
ignored
mantic
ignored
noble
needs-triage
oracular
dne
trusty
ignored
xenial
ignored