7.5
CVE-2022-44010
- EPSS 0.31%
- Published 23.11.2023 16:15:07
- Last modified 21.11.2024 07:27:31
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send a crafted HTTP request to the HTTP Endpoint (usually listening on port 8123 by default), causing a heap-based buffer overflow that crashes the process. This does not require authentication. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19.
Data is provided by the National Vulnerability Database (NVD)
Clickhouse ≫ Clickhouse Version < 22.3.12.19
Clickhouse ≫ Clickhouse Version >= 22.6 < 22.6.6.16
Clickhouse ≫ Clickhouse Version >= 22.7 < 22.7.4.16
Clickhouse ≫ Clickhouse Version >= 22.8 < 22.8.2.11
Clickhouse ≫ Clickhouse Version >= 22.9 < 22.9.1.2603
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.31% | 0.514 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.