Description
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits. This issue is very similar to CVE-2021-43304, but the vulnerable copy operation is in a different wildCopy call.
References (2)
Core 2
Core References
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/11/msg00002.html
Exploit, Third Party Advisory
https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms
Scores
CVSS v3
8.8
EPSS
0.0028
EPSS Percentile
51.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-122
CWE-787
Status
published
Products (2)
clickhouse/clickhouse
< 21.10.2.15
debian/debian_linux
10.0
Published
Mar 14, 2022
Tracked Since
Feb 18, 2026