7.5
CVE-2023-48298
- EPSS 0.47%
- Veröffentlicht 21.12.2023 23:15:09
- Zuletzt bearbeitet 21.11.2024 08:31:26
- Quelle security-advisories@github.com
- Teams Watchlist Login
- Unerledigt Login
ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. This vulnerability is an integer underflow resulting in crash due to stack buffer overflow in decompression of FPC codec. It can be triggered and exploited by an unauthenticated attacker. The vulnerability is very similar to CVE-2023-47118 with how the vulnerable function can be exploited.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Clickhouse ≫ Clickhouse Version >= 23.3 <= 23.3.17.13
Clickhouse ≫ Clickhouse Version >= 23.8 <= 23.8.7.24
Clickhouse ≫ Clickhouse Version >= 23.9 <= 23.9.5.29
Clickhouse ≫ Clickhouse Version >= 23.10 <= 23.10.4.25
Clickhouse ≫ Clickhouse Cloud Version >= 23.9 <= 23.9.2.47475
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.47% | 0.631 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
security-advisories@github.com | 5.9 | 2.2 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-191 Integer Underflow (Wrap or Wraparound)
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.