runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
Configuration 10 (hide)
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
Configuration 13 (hide)
|
History
No history.
Information
Published : 2019-02-11 19:29
Updated : 2024-02-02 12:15
NVD link : CVE-2019-5736
Mitre link : CVE-2019-5736
CVE.ORG link : CVE-2019-5736
JSON object : View
Products Affected
docker
- docker
opensuse
- leap
- backports_sle
netapp
- hci_management_node
- solidfire
microfocus
- service_management_automation
redhat
- openshift
- enterprise_linux_server
- enterprise_linux
- container_development_kit
fedoraproject
- fedora
- kubernetes_engine
linuxcontainers
- lxc
hp
- onesphere
canonical
- ubuntu_linux
d2iq
- dc\/os
- kubernetes_engine
apache
- mesos
linuxfoundation
- runc
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')