Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2018-15664

Опубликовано: 09 июл. 2019
Источник: msrc
EPSS Низкий

Описание

Docker Elevation of Privilege Vulnerability

Summary

CVE-2018-15664 describes a vulnerability in the Docker runtime (and the underlying community project, Moby) wherein a malicious/compromised container can acquire full read/write access to the host operating system where that container is running. The vulnerability depends on the way that the Docker runtime handles symbolic links and is most directly exploitable through the Docker copy API (‘docker cp’ in the Docker CLI).

What is the risk for Azure Kubernetes Service (AKS) and Azure IoT Edge customers?

The risk for AKS and Azure IoT Edge customers is minimal as the following need to be true:

  • A container on the host must be compromised.
  • The attacker must have access to the host machine, as the docker API is not exposed by default from outside of the host.

FAQ

How do I get the update for Microsoft Azure Kubernetes Service (AKS)?

There are two ways to get the update for AKS:

Возможность эксплуатации

Publicly Disclosed

Yes

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 90%
0.05635
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).

CVSS3: 7.5
redhat
больше 6 лет назад

In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).

CVSS3: 7.5
nvd
больше 6 лет назад

In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).

CVSS3: 7.5
debian
больше 6 лет назад

In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker ...

suse-cvrf
около 6 лет назад

Security update for docker

EPSS

Процентиль: 90%
0.05635
Низкий