Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-9357

Опубликовано: 11 дек. 2014
Источник: redhat
CVSS2: 4.6
EPSS Средний

Описание

Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.

A flaw was found in the way the Docker service unpacked images or builds after a "docker pull". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system.

Отчет

This issue affects the versions of Docker as shipped with Red Hat Enterprise Linux 7. However, this flaw is not known to be exploitable under any supported scenario. A future update may address this issue. Red Hat does not support or recommend running untrusted images.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1172782docker: Escalation of privileges during decompression of LZMA archives

EPSS

Процентиль: 95%
0.20452
Средний

4.6 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.

nvd
около 11 лет назад

Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.

debian
около 11 лет назад

Docker 1.3.2 allows remote attackers to execute arbitrary code with ro ...

CVSS3: 9.8
github
почти 4 года назад

Arbitrary Code Execution

oracle-oval
около 11 лет назад

ELSA-2014-3110: docker security update (IMPORTANT)

EPSS

Процентиль: 95%
0.20452
Средний

4.6 Medium

CVSS2