{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T15:45:05.498","vulnerabilities":[{"cve":{"id":"CVE-2023-48298","sourceIdentifier":"security-advisories@github.com","published":"2023-12-21T23:15:09.047","lastModified":"2024-11-21T08:31:26.090","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. This vulnerability is an integer underflow resulting in crash due to stack buffer overflow in decompression of FPC codec. It can be triggered and exploited by an unauthenticated attacker. The vulnerability is very similar to CVE-2023-47118 with how the vulnerable function can be exploited.\n"},{"lang":"es","value":"ClickHouse® es un sistema de gestión de bases de datos orientado a columnas de código abierto que permite generar informes de datos analíticos en tiempo real. Esta vulnerabilidad es un desbordamiento insuficiente de enteros que provoca un bloqueo debido al desbordamiento de búfer de pila en la descompresión del códec FPC. Puede ser desencadenado y explotado por un atacante no autenticado. La vulnerabilidad es muy similar a CVE-2023-47118 en cuanto a cómo se puede explotar la función vulnerable."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-191"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:*","versionStartIncluding":"23.3","versionEndIncluding":"23.3.17.13","matchCriteriaId":"BA3ACE71-E086-4AE4-99EE-42AD774EED64"},{"vulnerable":true,"criteria":"cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:*","versionStartIncluding":"23.8","versionEndIncluding":"23.8.7.24","matchCriteriaId":"A32881DE-F775-4AC0-A88D-9BC7885D116E"},{"vulnerable":true,"criteria":"cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:*","versionStartIncluding":"23.9","versionEndIncluding":"23.9.5.29","matchCriteriaId":"65BDEEEB-BC9D-4AA5-BE72-D0C67A88A3FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:*","versionStartIncluding":"23.10","versionEndIncluding":"23.10.4.25","matchCriteriaId":"2CAC16B5-C710-4F5F-9E65-27E260D110A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:clickhouse:clickhouse_cloud:*:*:*:*:*:*:*:*","versionStartIncluding":"23.9","versionEndIncluding":"23.9.2.47475","matchCriteriaId":"3D2CD6AA-64F5-4D44-B0CA-69A1F4416E16"}]}]}],"references":[{"url":"https://github.com/ClickHouse/ClickHouse/pull/56795","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-qw9f-qv29-8938","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/ClickHouse/ClickHouse/pull/56795","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-qw9f-qv29-8938","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}