Vulnerability CVE-2015-3629


Published: 2015-05-18

Description:
Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

Type:

CWE-59

(Improper Link Resolution Before File Access ('Link Following'))

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Docker -> Libcontainer 

 References:
http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
http://seclists.org/fulldisclosure/2015/May/28
http://www.securityfocus.com/bid/74558
https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ

Copyright 2024, cxsecurity.com

 

Back to Top