4.3
CVSSv2

CVE-2017-16539

Published: 04/11/2017 Updated: 27/11/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The DefaultLinuxSpec function in oci/defaults.go in Docker Moby up to and including 17.03.2-ce does not block /proc/scsi pathnames, which allows malicious users to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.

Vulnerable Product Search on Vulmon Subscribe to Product

mobyproject moby

Vendor Advisories

Debian Bug report logs - #900140 dockerio: CVE-2017-16539: The DefaultLinuxSpec function does not block /proc/scsi pathnames Package: src:dockerio; Maintainer for src:dockerio is Dmitry Smirnov <onlyjob@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 26 May 2018 18:33:01 UTC Severity: ...
The DefaultLinuxSpec function in oci/defaultsgo in Docker Moby through 17032-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP ...