2.1
CVSSv2

CVE-2016-3697

Published: 01/06/2016 Updated: 05/01/2021
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

libcontainer/user/user.go in runC prior to 0.1.0, as used in Docker prior to 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

docker docker

linuxfoundation runc

opensuse opensuse 13.2

Vendor Advisories

Synopsis Moderate: docker security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for docker is now available for Red Hat Enterprise Linux 7 ExtrasRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVS ...
It was found that Docker would launch containers under the specified UID instead of a username An attacker able to launch a container could use this flaw to escalate their privileges to root within the launched container ...

Github Repositories

Description CVE info extractor: use NVD CPE api to retrieve CVES(by using version number, product name) and use openCVE api to fetch CVE details (OpenCVE is faster than NVD Api but dont provide products version number researsh) Volumes /CVE_extractor/OPSToolsjson:/home/OPSToolsjson /CVE_extractor/configjson:/home/configjson confi