Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-3630

Опубликовано: 07 мая 2015
Источник: redhat
CVSS2: 5.8

Описание

Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1219063docker: Read/write proc paths allow host modification & information disclosure

5.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.

nvd
больше 10 лет назад

Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.

msrc
больше 4 лет назад

Описание отсутствует

debian
больше 10 лет назад

Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, ...

CVSS3: 8.4
github
почти 4 года назад

Information Exposure in Docker Engine

5.8 Medium

CVSS2