5
CVSSv2

CVE-2014-6408

Published: 12/12/2014 Updated: 15/12/2014
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Docker 1.3.0 up to and including 1.3.1 allows remote malicious users to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

docker docker 1.3.0

docker docker 1.3.1

Vendor Advisories

Docker versions 130 through 131 allowed security options to be applied to images, allowing images to modify the default run profile of containers executing these images This vulnerability could allow a malicious image creator to loosen the restrictions applied to a container's processes, potentially facilitating a break-out (CVE-2014-6408) T ...

Recent Articles

How secure is Docker? If you're not running version 1.3.2, NOT VERY
The Register • Neil McAllister in San Francisco • 25 Nov 2014

UPGRADE NOW to fix vuln found in all previous versions

A nasty vulnerability has been discovered in the Docker application containerization software for Linux that could allow an attacker to gain elevated privileges and execute code remotely on affected systems. The bug, which has been corrected in Docker 1.3.2, affects all previous versions of the software. "No remediation is available for older versions of Docker and users are advised to upgrade," the company said in a security advisory on Monday. The flaw, which has been assigned CVE-2014-6407, r...