Lucene search

K
nvd[email protected]NVD:CVE-2019-5736
HistoryFeb 11, 2019 - 7:29 p.m.

CVE-2019-5736

2019-02-1119:29:00
CWE-78
web.nvd.nist.gov

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.6%

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

Affected configurations

NVD
Node
dockerdockerRange<18.09.2
Node
linuxfoundationruncRange0.1.1
OR
linuxfoundationruncMatch1.0.0rc1
OR
linuxfoundationruncMatch1.0.0rc2
OR
linuxfoundationruncMatch1.0.0rc3
OR
linuxfoundationruncMatch1.0.0rc4
OR
linuxfoundationruncMatch1.0.0rc5
OR
linuxfoundationruncMatch1.0.0rc6
Node
redhatcontainer_development_kitMatch3.7
OR
redhatopenshiftMatch3.4
OR
redhatopenshiftMatch3.5
OR
redhatopenshiftMatch3.6
OR
redhatopenshiftMatch3.7
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linux_serverMatch7.0
Node
googlekubernetes_engineMatch-
Node
linuxcontainerslxcRange<3.2.0
Node
hponesphereMatch-
Node
netapphci_management_nodeMatch-
OR
netappsolidfireMatch-
Node
apachemesosRange1.4.01.4.3
OR
apachemesosRange1.5.01.5.3
OR
apachemesosRange1.6.01.6.2
OR
apachemesosRange1.7.01.7.2
Node
opensusebackports_sleMatch15.0-
OR
opensusebackports_sleMatch15.0sp1
OR
opensuseleapMatch15.0
OR
opensuseleapMatch15.1
OR
opensuseleapMatch42.3
Node
d2iqkubernetes_engineRange<2.2.0-1.13.3
OR
d2iqdc\/osRange<1.10.10
OR
d2iqdc\/osRange1.10.111.11.9
OR
d2iqdc\/osRange1.11.101.12.1
Node
fedoraprojectfedoraMatch29
OR
fedoraprojectfedoraMatch30
Node
canonicalubuntu_linuxMatch16.04lts
OR
canonicalubuntu_linuxMatch18.04lts
OR
canonicalubuntu_linuxMatch18.10
OR
canonicalubuntu_linuxMatch19.04
Node
microfocusservice_management_automationMatch2018.02
OR
microfocusservice_management_automationMatch2018.05
OR
microfocusservice_management_automationMatch2018.08
OR
microfocusservice_management_automationMatch2018.11

References

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.6%