9.3
CVE-2019-5736
- EPSS 53.41%
- Published 11.02.2019 19:29:00
- Last modified 21.11.2024 04:45:24
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
Data is provided by the National Vulnerability Database (NVD)
Linuxfoundation ≫ Runc Version <= 0.1.1
Linuxfoundation ≫ Runc Version1.0.0 Updaterc1
Linuxfoundation ≫ Runc Version1.0.0 Updaterc2
Linuxfoundation ≫ Runc Version1.0.0 Updaterc3
Linuxfoundation ≫ Runc Version1.0.0 Updaterc4
Linuxfoundation ≫ Runc Version1.0.0 Updaterc5
Linuxfoundation ≫ Runc Version1.0.0 Updaterc6
Redhat ≫ Container Development Kit Version3.7
Redhat ≫ Enterprise Linux Version8.0
Redhat ≫ Enterprise Linux Server Version7.0
Google ≫ Kubernetes Engine Version-
Linuxcontainers ≫ Lxc Version < 3.2.0
Netapp ≫ Hci Management Node Version-
Opensuse ≫ Backports Sle Version15.0 Update-
Opensuse ≫ Backports Sle Version15.0 Updatesp1
D2iq ≫ Kubernetes Engine Version < 2.2.0-1.13.3
Fedoraproject ≫ Fedora Version29
Fedoraproject ≫ Fedora Version30
Canonical ≫ Ubuntu Linux Version16.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version18.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version18.10
Canonical ≫ Ubuntu Linux Version19.04
Microfocus ≫ Service Management Automation Version2018.02
Microfocus ≫ Service Management Automation Version2018.05
Microfocus ≫ Service Management Automation Version2018.08
Microfocus ≫ Service Management Automation Version2018.11
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 53.41% | 0.979 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.6 | 1.8 | 6 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.