Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-12608

Опубликовано: 09 окт. 2018
Источник: redhat
CVSS3: 7.5

Описание

An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate.

A certificate signing vulnerability was found in Moby. This issue could allow an unauthenticated remote attacker to validate a TLS certificate using Certificate Authorities (CA) from the system instead of only by a specified client CA root, which could allow bypassing of some certificate authorization rules, reducing system integrity.

Меры по смягчению последствий

Some environments may be able to mitigate this issue by removing extra CAs from the host.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Multicluster Engine for Kubernetesmulticluster-engine/agent-service-rhel8Not affected
OpenShift Service Mesh 2openshift-service-mesh/proxyv2-rhel8Will not fix
Red Hat Ceph Storage 5rhceph/rhceph-5-dashboard-rhel8Affected
Red Hat Ceph Storage 6rhceph/rhceph-6-dashboard-rhel9Affected
Red Hat Ceph Storage 7rhceph/grafana-rhel9Affected
Red Hat OpenShift Container Platform 4openshift4/ose-agent-installer-api-server-rhel9Affected
Red Hat OpenShift Container Platform 4openshift4/ose-consoleWill not fix
Red Hat OpenShift Service Mesh 2.6 for RHEL 8openshift-service-mesh/grafana-rhel8FixedRHSA-2024:509407.08.2024
Red Hat OpenShift Service Mesh 2.6 for RHEL 8openshift-service-mesh/istio-cni-rhel8FixedRHSA-2024:509407.08.2024
Red Hat OpenShift Service Mesh 2.6 for RHEL 8openshift-service-mesh/istio-must-gather-rhel8FixedRHSA-2024:509407.08.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-295

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate.

CVSS3: 7.5
nvd
больше 7 лет назад

An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate.

CVSS3: 7.5
debian
больше 7 лет назад

An issue was discovered in Docker Moby before 17.06.0. The Docker engi ...

CVSS3: 7.5
github
около 2 лет назад

Docker Authentication Bypass

7.5 High

CVSS3