4.4
CVSSv2

CVE-2016-9962

Published: 31/01/2017 Updated: 07/11/2023
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 6.4 | Impact Score: 5.9 | Exploitability Score: 0.5
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

docker docker

Vendor Advisories

Debian Bug report logs - #850951 CVE-2016-9962 Package: src:runc; Maintainer for src:runc is Debian Go Packaging Team <pkg-go-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 11 Jan 2017 15:24:01 UTC Severity: grave Tags: security, upstream Found in version runc/011 ...
Synopsis Moderate: runc security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for runc is now available for Red Hat Enterprise Linux 7 ExtrasRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Moderate: docker-latest security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for docker-latest is now available for Red Hat Enterprise Linux 7 ExtrasRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulne ...
Synopsis Moderate: docker security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for docker is now available for Red Hat Enterprise Linux 7 ExtrasRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scori ...
Synopsis Important: docker security update Type/Severity Security Advisory: Important Topic An update for docker is now available for Red Hat Enterprise Linux 7 ExtrasRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base s ...
It was discovered that runC allowed additional container processes via `runc exec` to be ptraced by the pid 1 of the container This allows the main processes of the container, if running as root, to gain access to file descriptors of these new processes during the initialization, which can lead to container escapes or modification of runC state be ...
The runc component used by `docker exec` feature of docker allowed additional container processes to be ptraced by the pid 1 of the container This allows the main processes of the container, if running as root, to gain low-level access to these new processes during initialization An attacker can, depending on the nature of the incoming process, l ...
The runc component used by `docker exec` feature of docker allowed additional container processes to be ptraced by the pid 1 of the container This allows the main processes of the container, if running as root, to gain low-level access to these new processes during initialization An attacker can, depending on the nature of the incoming process, l ...

Github Repositories

WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift

dockerevil A simple repository to store my security flaws in the docker technology 2016 - 2017 Docker API Privilege Escalation(LPE/RPE) Escalate from Offline Server/Minimal Images/Build from TAR Dockerfile Docker SUDO Privilege Escalation (PoC) Nmap Scripts 2019 CodeStudent1995 Based Exploit OpenShift Privilege Escalation(oc) Other awesome security flaws found in the do