7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
github.com/docker/docker is vulnerable to information disclosure. Attackers can obtain sensitive information, modify the host and perform protocol downgrade attacks using a docker image. These attacks are possible because github.com/docker/docker uses weak permissions for files in the /proc
folder.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/docker/docker | eq | HEAD | |
github.com/docker/docker | le | 1.6.0 | |
docker | eq | 1.6.2__8.el7 |
lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
seclists.org/fulldisclosure/2015/May/28
www.securityfocus.com/bid/74566
github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660
groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ