Описание
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.3.1~dfsg1-1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1.6.2~dfsg1-1ubuntu4~14.04.1]] |
esm-infra/xenial | not-affected | 1.3.1~dfsg1-1 |
lucid | DNE | |
precise | DNE | |
precise/esm | DNE | |
trusty | released | 1.6.2~dfsg1-1ubuntu4~14.04.1 |
trusty/esm | DNE | trusty was released [1.6.2~dfsg1-1ubuntu4~14.04.1] |
upstream | released | 1.3.1~dfsg1-1 |
utopic | ignored | end of life |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when ...
EPSS
5 Medium
CVSS2