Description
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits.
References
https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms
https://lists.debian.org/debian-lts-announce/2022/11/msg00002.html
https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms
https://lists.debian.org/debian-lts-announce/2022/11/msg00002.html
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2022-03-14T23:15:08.157
3 years agoLast modified
2025-06-25T20:49:29.357
6 months ago