Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-9357

Опубликовано: 11 дек. 2014
Источник: redhat
CVSS2: 4.6

Описание

Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.

A flaw was found in the way the Docker service unpacked images or builds after a "docker pull". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system.

Отчет

This issue affects the versions of Docker as shipped with Red Hat Enterprise Linux 7. However, this flaw is not known to be exploitable under any supported scenario. A future update may address this issue. Red Hat does not support or recommend running untrusted images.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1172782docker: Escalation of privileges during decompression of LZMA archives

4.6 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.

nvd
больше 10 лет назад

Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.

debian
больше 10 лет назад

Docker 1.3.2 allows remote attackers to execute arbitrary code with ro ...

CVSS3: 9.8
github
больше 3 лет назад

Arbitrary Code Execution

oracle-oval
больше 10 лет назад

ELSA-2014-3110: docker security update (IMPORTANT)

4.6 Medium

CVSS2

Уязвимость CVE-2014-9357