Description
ClickHouse is an open-source column-oriented database management system that allows generating analytical data reports in real-time. A heap buffer overflow issue was discovered in ClickHouse server. An attacker could send a specially crafted payload to the native interface exposed by default on port 9000/tcp, triggering a bug in the decompression logic of Gorilla codec that crashes the ClickHouse server process. This attack does not require authentication. This issue has been addressed in ClickHouse Cloud version 23.9.2.47551 and ClickHouse versions 23.10.5.20, 23.3.18.15, 23.8.8.20, and 23.9.6.20.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-5rmf-5g48-xv63
Patch x_refsource_misc
https://github.com/ClickHouse/ClickHouse/pull/57107
Scores
CVSS v3
7.0
EPSS
0.0047
EPSS Percentile
64.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
Details
CWE
CWE-122
CWE-120
CWE-787
Status
published
Products (2)
clickhouse/clickhouse
23.3 - 23.3.18.15
clickhouse/clickhouse_cloud
< 23.9.2.47551
Published
Dec 22, 2023
Tracked Since
Feb 18, 2026