CVE-2021-43304 — Heap-based Buffer Overflow in Clickhouse
Severity
8.8HIGHNVD
EPSS
0.1%
top 64.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 14
Latest updateMar 16
Description
Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy(op, ip, copy_end), don’t exceed the destination buffer’s limits.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages4 packages
Also affects: Debian Linux 10.0
🔴Vulnerability Details
4GHSA▶
GHSA-rjm8-hjq2-73j6: Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query↗2022-03-16
GHSA▶
GHSA-4px5-4p3v-7568: Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query↗2022-03-16
OSV▶
CVE-2021-43304: Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query↗2022-03-14
OSV▶
CVE-2021-43305: Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query↗2022-03-14