8.8
CVSSv3

CVE-2021-43305

Published: 14/03/2022 Updated: 08/12/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Heap buffer overflow in Clickhouse's LZ4 compression codec when parsing a malicious query. There is no verification that the copy operations in the LZ4::decompressImpl loop and especially the arbitrary copy operation wildCopy<copy_amount>(op, ip, copy_end), don’t exceed the destination buffer’s limits. This issue is very similar to CVE-2021-43304, but the vulnerable copy operation is in a different wildCopy call.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

yandex clickhouse

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #1008216 clickhouse: Multiple CVEs in clickhouse - heap overflows and out of bounds reads in LZ4 compression (CVE-2021-42387 CVE-2021-42388 CVE-2021-43304 CVE-2021-43305) Package: src:clickhouse; Maintainer for src:clickhouse is Alexander GQ Gerasiov &lt;gq@debianorg&gt;; Reported by: Neil Williams &lt;cod ...