Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-15664
HistoryMay 23, 2019 - 12:00 a.m.

CVE-2018-15664

2019-05-2300:00:00
ubuntu.com
ubuntu.com
15

7.5 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

29.0%

In Docker through 18.06.1-ce-rc2, the API endpoints behind the ‘docker cp’
command are vulnerable to a symlink-exchange attack with Directory
Traversal, giving attackers arbitrary read-write access to the host
filesystem with root privileges, because daemon/archive.go does not do
archive operations on a frozen filesystem (or from within a chroot).

Bugs

Notes

Author Note
mdeslaur initial commits caused a regression which then got fixed, see upstream bug
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchdocker.io< 18.09.7-0ubuntu1~18.04.3UNKNOWN
ubuntu18.10noarchdocker.io< 18.09.7-0ubuntu1~18.10.3UNKNOWN
ubuntu19.04noarchdocker.io< 18.09.7-0ubuntu1~19.04.4UNKNOWN
ubuntu16.04noarchdocker.io< 18.09.7-0ubuntu1~16.04.4UNKNOWN

7.5 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

29.0%