Out-of-bounds Write Affecting clickhouse package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.08% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-CLICKHOUSE-6084489
  • published25 Nov 2023
  • disclosed23 Nov 2023

Introduced: 23 Nov 2023

CVE-2022-44010  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

There is no fixed version for Debian:10 clickhouse.

NVD Description

Note: Versions mentioned in the description apply only to the upstream clickhouse package and not the clickhouse package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send a crafted HTTP request to the HTTP Endpoint (usually listening on port 8123 by default), causing a heap-based buffer overflow that crashes the process. This does not require authentication. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19.

CVSS Scores

version 3.1