Permissions, Privileges, and Access Controls in Docker - CVE-2014-6408
Published: December 12, 2014 / Updated: July 28, 2020
Vulnerability identifier: #VU32459
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2014-6408
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Docker Inc.
Affected software:
Docker
Docker
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
How to mitigate CVE-2014-6408
Install update from vendor's website.
Sources
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html
- http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html
- http://secunia.com/advisories/60171
- http://secunia.com/advisories/60241
- http://www.openwall.com/lists/oss-security/2014/11/24/5
- https://docs.docker.com/v1.3/release-notes/