PingCAP TiDB v8.1.0 was discovered to contain a buffer overflow via the component expression.ExplainExpressionList. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. NOTE: PingCAP maintains that the actual reproduction of this issue did not cause the security impact of service interruption to other users. They argue that this is a complex query bug and not a DoS vulnerability.
References
Link | Resource |
---|---|
https://gist.github.com/ycybfhb/eec3a1eefe4c85eb22f1bca6114359a1 | Third Party Advisory |
https://github.com/pingcap/tidb/issues/53796 | Exploit Issue Tracking |
Configurations
History
04 Sep 2025, 18:49
Type | Values Removed | Values Added |
---|---|---|
First Time |
Pingcap
Pingcap tidb |
|
CPE | cpe:2.3:a:pingcap:tidb:8.1.0:-:*:*:*:*:*:* | |
References | () https://gist.github.com/ycybfhb/eec3a1eefe4c85eb22f1bca6114359a1 - Third Party Advisory | |
References | () https://github.com/pingcap/tidb/issues/53796 - Exploit, Issue Tracking |
Information
Published : 2024-09-03 21:15
Updated : 2025-09-04 18:49
NVD link : CVE-2024-41433
Mitre link : CVE-2024-41433
CVE.ORG link : CVE-2024-41433
JSON object : View
Products Affected
pingcap
- tidb
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')