Description
An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send a crafted HTTP request to the HTTP Endpoint (usually listening on port 8123 by default), causing a heap-based buffer overflow that crashes the process. This does not require authentication. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-46973 | An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send a crafted HTTP request to the HTTP Endpoint (usually listening on port 8123 by default), causing a heap-based buffer overflow that crashes the process. This does not require authentication. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19. |
References
| Link | Providers |
|---|---|
| https://clickhouse.com/docs/en/whats-new/security-changelog |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T13:47:05.601Z
Reserved: 2022-10-29T00:00:00.000Z
Link: CVE-2022-44010
No data.
Status : Modified
Published: 2023-11-23T16:15:07.157
Modified: 2024-11-21T07:27:31.410
Link: CVE-2022-44010
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD