Bug 1218383 (CVE-2023-48704) - VUL-0: CVE-2023-48704: server:database/ClickHouse: remote crash
Summary: VUL-0: CVE-2023-48704: server:database/ClickHouse: remote crash
Status: NEW
Alias: CVE-2023-48704
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Matwey Kornilov
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/389218/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-12-24 09:08 UTC by SMASH SMASH
Modified: 2023-12-25 00:15 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-12-24 09:08:30 UTC
(not in official openSUSE projects, only server:database)

ClickHouse is an open-source column-oriented database management system that allows generating analytical data reports in real-time. A heap buffer overflow issue was discovered in ClickHouse server. An attacker could send a specially crafted payload to the native interface exposed by default on port 9000/tcp, triggering a bug in the decompression logic of Gorilla codec that crashes the ClickHouse server process. This attack does not require authentication. This issue has been addressed in ClickHouse Cloud version 23.9.2.47551 and ClickHouse versions 23.10.5.20, 23.3.18.15, 23.8.8.20, and 23.9.6.20.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-48704