5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.005 Low
EPSS
Percentile
75.9%
Docker Registry before 2.6.2 in Docker Distribution does not properly restrict the amount of content accepted from a user, which allows remote attackers to cause a denial of service (memory consumption) via the manifest endpoint.
github.com/docker/distribution/registry/storage
github.com/docker/distribution/registry/handlers
CPE | Name | Operator | Version |
---|---|---|---|
github.com/docker/distribution | lt | 2.7.0-rc.0 |
lists.opensuse.org/opensuse-security-announce/2020-09/msg00047.html
access.redhat.com/errata/RHSA-2017:2603
github.com/advisories/GHSA-h62f-wm92-2cmw
github.com/distribution/distribution/commit/91c507a39abfce14b5c8541cf284330e22208c0f
github.com/distribution/distribution/pull/2340
github.com/docker/distribution/pull/2340
github.com/docker/distribution/releases/tag/v2.6.2
nvd.nist.gov/vuln/detail/CVE-2017-11468
pkg.go.dev/vuln/GO-2021-0072
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.005 Low
EPSS
Percentile
75.9%