ClickHouse v24.3.3.102 was discovered to contain a buffer overflow via the component DB::evaluateConstantExpressionImpl.
References
Link | Resource |
---|---|
https://gist.github.com/ycybfhb/db127ae9d105a4d20edc9f010a959016 | Third Party Advisory |
https://github.com/ClickHouse/ClickHouse/issues/65520 | Exploit Issue Tracking |
Configurations
History
03 Jul 2025, 12:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/ycybfhb/db127ae9d105a4d20edc9f010a959016 - Third Party Advisory | |
References | () https://github.com/ClickHouse/ClickHouse/issues/65520 - Exploit, Issue Tracking | |
CPE | cpe:2.3:a:clickhouse:clickhouse:24.3.3.102:*:*:*:*:*:*:* | |
Summary |
|
|
First Time |
Clickhouse
Clickhouse clickhouse |
03 Sep 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
03 Sep 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-03 19:15
Updated : 2025-07-03 12:51
NVD link : CVE-2024-41436
Mitre link : CVE-2024-41436
CVE.ORG link : CVE-2024-41436
JSON object : View
Products Affected
clickhouse
- clickhouse
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')