Permissions, Privileges, and Access Controls in Docker - CVE-2014-6408

 

Permissions, Privileges, and Access Controls in Docker - CVE-2014-6408

Published: December 12, 2014 / Updated: July 28, 2020


Vulnerability identifier: #VU32459
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2014-6408
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Docker Inc.
Affected software:
Docker

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.


How to mitigate CVE-2014-6408

Install update from vendor's website.

Sources