Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-6408

Опубликовано: 24 нояб. 2014
Источник: redhat
CVSS2: 3.7
EPSS Низкий

Описание

Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.

Отчет

This issue did not affect the version of Docker as shipped with Red Hat Enterprise Linux 7. The next current release of Docker is < 1.30 and the next release will be based off of 1.3.2 or greater.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7dockerNot affected

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1167506docker: potential container escalation

EPSS

Процентиль: 81%
0.01656
Низкий

3.7 Low

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.

nvd
больше 10 лет назад

Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.

debian
больше 10 лет назад

Docker 1.3.0 through 1.3.1 allows remote attackers to modify the defau ...

github
больше 3 лет назад

Access Restriction Bypass in Docker

oracle-oval
больше 10 лет назад

ELSA-2014-3095: docker security and bug fix update (IMPORTANT)

EPSS

Процентиль: 81%
0.01656
Низкий

3.7 Low

CVSS2