Skip to main content

CVE-2019-16536: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Clickhouse DB

High
VulnerabilityCVE-2019-16536cvecve-2019-16536cwe-120
Published: Wed May 21 2025 (05/21/2025, 07:13:15 UTC)
Source: CVE
Vendor/Project: Clickhouse
Product: DB

Description

Stack overflow leading to DoS can be triggered by a malicious authenticated client in Clickhouse before 19.14.3.3.

AI-Powered Analysis

AILast updated: 07/06/2025, 05:11:32 UTC

Technical Analysis

CVE-2019-16536 is a high-severity vulnerability identified in the Clickhouse database system, specifically affecting versions prior to 19.14.3.3. The vulnerability is classified under CWE-120, which pertains to classic buffer overflow issues caused by improper handling of input sizes during buffer copy operations. In this case, a stack-based buffer overflow can be triggered by a malicious, authenticated client sending crafted input that exceeds the expected buffer size. This overflow leads to a denial-of-service (DoS) condition by crashing the Clickhouse database process. The vulnerability does not require user interaction beyond authentication, but it does require the attacker to have authenticated access to the database. The CVSS 4.0 score is 8.2, indicating a high severity with network attack vector, low attack complexity, no user interaction, and high impact on availability. Confidentiality and integrity impacts are not indicated. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided in the source information. The vulnerability affects the core database product of Clickhouse, a column-oriented database management system widely used for online analytical processing (OLAP) and big data workloads.

Potential Impact

For European organizations using Clickhouse DB, this vulnerability poses a significant risk primarily to service availability. An attacker with authenticated access could deliberately trigger the buffer overflow to cause database crashes, resulting in downtime and disruption of critical data analytics and business intelligence operations. This could impact sectors relying heavily on real-time data processing such as finance, telecommunications, e-commerce, and public services. Although the vulnerability does not directly compromise data confidentiality or integrity, the resulting DoS could lead to operational delays, loss of business continuity, and potential cascading effects on dependent systems. Organizations with multi-tenant environments or exposed authentication mechanisms are at higher risk. The lack of known exploits in the wild reduces immediate threat but does not eliminate the risk of targeted attacks or future exploit development.

Mitigation Recommendations

Given the absence of an official patch link, European organizations should take immediate steps to mitigate risk: 1) Restrict and tightly control authenticated access to Clickhouse instances, employing strong authentication mechanisms and network segmentation to limit exposure. 2) Monitor database logs and network traffic for unusual or malformed queries that could indicate exploitation attempts. 3) Implement rate limiting and anomaly detection on client connections to prevent abuse by malicious authenticated users. 4) Consider deploying Clickhouse versions later than 19.14.3.3 if available, or apply vendor-provided patches once released. 5) Use application-layer firewalls or database proxies to sanitize inputs and block suspicious payloads. 6) Prepare incident response plans for rapid recovery from DoS events, including database restarts and failover procedures. 7) Engage with Clickhouse vendor support channels for updates and advisories. These measures go beyond generic advice by focusing on access control, monitoring, and operational readiness specific to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
yandex
Date Reserved
2019-09-19T00:00:00.000Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d8121c631aa761259d36f

Added to database: 5/21/2025, 7:30:41 AM

Last enriched: 7/6/2025, 5:11:32 AM

Last updated: 8/13/2025, 9:25:32 PM

Views: 35

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats