cve/2022/CVE-2022-44010.md

18 lines
837 B
Markdown
Raw Permalink Normal View History

2024-08-05 18:41:32 +00:00
### [CVE-2022-44010](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44010)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send a crafted HTTP request to the HTTP Endpoint (usually listening on port 8123 by default), causing a heap-based buffer overflow that crashes the process. This does not require authentication. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19.
### POC
#### Reference
- https://clickhouse.com/docs/en/whats-new/security-changelog
#### Github
No PoCs found on GitHub currently.