445
VMScore

CVE-2017-11468

Published: 20/07/2017 Updated: 20/01/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Docker Registry prior to 2.6.2 in Docker Distribution does not properly restrict the amount of content accepted from a user, which allows remote malicious users to cause a denial of service (memory consumption) via the manifest endpoint.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

docker docker registry

redhat enterprise linux server 7.0

Vendor Advisories

Debian Bug report logs - #869242 CVE-2017-11468 Package: src:docker-registry; Maintainer for src:docker-registry is pkg-go <pkg-go-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 21 Jul 2017 21:39:01 UTC Severity: important Tags: security Found in version docker-regi ...
It was found that docker-distribution did not properly restrict memory allocation size for a registry instance through the manifest endpoint An attacker could send a specially crafted request that would exhaust the memory of the docker-distribution service ...