Description
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits.
References
https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms
ExploitThird Party Advisory
https://lists.debian.org/debian-lts-announce/2022/11/msg00002.html
Mailing ListThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2022-03-14T23:15:08.157
3 years agoLast modified
2022-12-08T03:16:53.623
2 years ago