CVE-2019-5736

Severity CVSS v4.0:
Pending analysis
Type:
CWE-78 OS Command Injections
Publication date:
11/02/2019
Last modified:
02/02/2024

Description

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:* 18.09.2 (excluding)
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:* 0.1.1 (including)
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*


References to Advisories, Solutions, and Tools