Vulnerability Description
ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. This vulnerability is an integer underflow resulting in crash due to stack buffer overflow in decompression of FPC codec. It can be triggered and exploited by an unauthenticated attacker. The vulnerability is very similar to CVE-2023-47118 with how the vulnerable function can be exploited.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Clickhouse | Clickhouse | >= 23.3, <= 23.3.17.13 |
| Clickhouse | Clickhouse Cloud | >= 23.9, <= 23.9.2.47475 |
Related Weaknesses (CWE)
References
- https://github.com/ClickHouse/ClickHouse/pull/56795Patch
- https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-qw9f-qv29-8938Vendor Advisory
- https://github.com/ClickHouse/ClickHouse/pull/56795Patch
- https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-qw9f-qv29-8938Vendor Advisory
FAQ
What is CVE-2023-48298?
CVE-2023-48298 is a vulnerability with a CVSS score of 5.9 (MEDIUM). ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. This vulnerability is an integer underflow resulting in crash due ...
How severe is CVE-2023-48298?
CVE-2023-48298 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-48298?
Check the references section above for vendor advisories and patch information. Affected products include: Clickhouse Clickhouse, Clickhouse Clickhouse Cloud.