Heap-based Buffer Overflow Affecting clickhouse/clickhouse package, versions [,23.8.15.35-lts)[24.3.1.2672-lts, 24.3.4.147-lts)[24.4.1.2088-stable, 24.4.2.141-stable)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-CLICKHOUSECLICKHOUSE-7577998
  • published2 Aug 2024
  • disclosed1 Aug 2024
  • creditUnknown

Introduced: 1 Aug 2024

CVE-2024-6873  (opens in a new tab)
CWE-122  (opens in a new tab)

How to fix?

Upgrade clickhouse/clickhouse to version 23.8.15.35-lts, 24.3.4.147-lts, 24.4.2.141-stable or higher.

Overview

Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the native interface. An attacker can crash the server or redirect the execution flow by sending a specially crafted request.

Note: This redirection is limited to what is available within a 256-byte range of memory at the time of execution

CVSS Scores

version 4.0
version 3.1