CVE-2023-48704

ClickHouse is an open-source column-oriented database management system that allows generating analytical data reports in real-time. A heap buffer overflow issue was discovered in ClickHouse server. An attacker could send a specially crafted payload to the native interface exposed by default on port 9000/tcp, triggering a bug in the decompression logic of Gorilla codec that crashes the ClickHouse server process. This attack does not require authentication. This issue has been addressed in ClickHouse Cloud version 23.9.2.47551 and ClickHouse versions 23.10.5.20, 23.3.18.15, 23.8.8.20, and 23.9.6.20.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
GitHub_MCNA
7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 57%
VendorProductVersion
clickhouseclickhouse
23.3 ≤
𝑥
< 23.3.18.15
clickhouseclickhouse
23.8 ≤
𝑥
< 23.8.8.20
clickhouseclickhouse
23.9 ≤
𝑥
< 23.9.6.20
clickhouseclickhouse
23.10 ≤
𝑥
< 23.10.5.20
clickhouseclickhouse_cloud
𝑥
< 23.9.2.47551
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
clickhouse
bullseye
18.16.1+ds-7.2+deb11u1
fixed
bookworm
18.16.1+ds-7.3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
clickhouse
oracular
dne
noble
needs-triage
mantic
ignored
lunar
ignored
jammy
dne
focal
needs-triage
bionic
ignored
xenial
ignored
trusty
ignored