Show filters
23 Total Results
Displaying 11-20 of 23
Sort by:
Attacker Value
Unknown

CVE-2021-42387

Disclosure Date: March 14, 2022 (last updated November 29, 2024)
Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As part of the LZ4::decompressImpl() loop, a 16-bit unsigned user-supplied value ('offset') is read from the compressed data. The offset is later used in the length of a copy operation, without checking the upper bounds of the source of the copy operation.
Attacker Value
Unknown

CVE-2021-43304

Disclosure Date: March 14, 2022 (last updated November 29, 2024)
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits.
Attacker Value
Unknown

CVE-2021-43305

Disclosure Date: March 14, 2022 (last updated November 29, 2024)
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits. This issue is very similar to CVE-2021-43304, but the vulnerable copy operation is in a different wildCopy call.
Attacker Value
Unknown

CVE-2021-42388

Disclosure Date: March 14, 2022 (last updated November 29, 2024)
Heap out-of-bounds read in Clickhouse's LZ4 compression codec when parsing a malicious query. As part of the LZ4::decompressImpl() loop, a 16-bit unsigned user-supplied value ('offset') is read from the compressed data. The offset is later used in the length of a copy operation, without checking the lower bounds of the source of the copy operation.
Attacker Value
Unknown

CVE-2020-26759

Disclosure Date: January 06, 2021 (last updated February 22, 2025)
clickhouse-driver before 0.1.5 allows a malicious clickhouse server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, due to a buffer overflow.
Attacker Value
Unknown

CVE-2019-15024

Disclosure Date: December 30, 2019 (last updated November 27, 2024)
In all versions of ClickHouse before 19.14.3, an attacker having write access to ZooKeeper and who is able to run a custom server available from the network where ClickHouse runs, can create a custom-built malicious server that will act as a ClickHouse replica and register it in ZooKeeper. When another replica will fetch data part from the malicious replica, it can force clickhouse-server to write to arbitrary path on filesystem.
Attacker Value
Unknown

CVE-2019-18657

Disclosure Date: October 31, 2019 (last updated November 27, 2024)
ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function.
Attacker Value
Unknown

CVE-2018-14672

Disclosure Date: August 15, 2019 (last updated November 27, 2024)
In ClickHouse before 18.12.13, functions for loading CatBoost models allowed path traversal and reading arbitrary files through error messages.
0
Attacker Value
Unknown

CVE-2018-14669

Disclosure Date: August 15, 2019 (last updated November 27, 2024)
ClickHouse MySQL client before versions 1.1.54390 had "LOAD DATA LOCAL INFILE" functionality enabled that allowed a malicious MySQL database read arbitrary files from the connected ClickHouse server.
0
Attacker Value
Unknown

CVE-2018-14668

Disclosure Date: August 15, 2019 (last updated November 27, 2024)
In ClickHouse before 1.1.54388, "remote" table function allowed arbitrary symbols in "user", "password" and "default_database" fields which led to Cross Protocol Request Forgery Attacks.
0