runc up to and including 1.0-rc6, as used in Docker prior to 18.09.2 and other products, allows malicious users to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
docker docker |
||
linuxfoundation runc |
||
linuxfoundation runc 1.0.0 |
||
redhat container development kit 3.7 |
||
redhat openshift 3.4 |
||
redhat openshift 3.5 |
||
redhat openshift 3.6 |
||
redhat openshift 3.7 |
||
redhat enterprise linux 8.0 |
||
redhat enterprise linux server 7.0 |
||
google kubernetes engine - |
||
linuxcontainers lxc |
||
hp onesphere - |
||
netapp hci management node - |
||
netapp solidfire - |
||
apache mesos |
||
opensuse backports sle 15.0 |
||
opensuse leap 15.0 |
||
opensuse leap 15.1 |
||
opensuse leap 42.3 |
||
d2iq kubernetes engine |
||
d2iq dc\\/os |
||
fedoraproject fedora 30 |
||
fedoraproject fedora 29 |
||
canonical ubuntu linux 16.04 |
||
canonical ubuntu linux 18.04 |
||
canonical ubuntu linux 18.10 |
||
canonical ubuntu linux 19.04 |
||
microfocus service management automation 2018.02 |
||
microfocus service management automation 2018.05 |
||
microfocus service management automation 2018.08 |
||
microfocus service management automation 2018.11 |
The pandemic has fast-tracked migration to the public cloud, including Amazon Web Services, Google Compute Platform and Microsoft Azure. But the journey hasn’t exactly been smooth as silk: The great migration has brought a raft of complex security challenges, which have led to headline-grabbing data exposures and more. Misconfigurations and a lack of visibility into cloud assets and inventory are the biggest culprits for public-cloud insecurity. Thankfully, there are approaches that can help.<...
The inexorable movement of data and applications to the cloud that began several years ago and accelerated during the pandemic shows no signs of slowing down. The rationale for this transformation is driven by a desire to outsource non-critical functions (building and maintaining data centers, running and patching standard software packages) and to achieve business agility (scaling up, the ability to rapidly shift focus in light of market conditions).
Some of this migration is to public cl...
Attackers are actively scanning for exposed Docker APIs on port 2375 and use them to deploy a malicious payload which drops a Dofloo Trojan variant, a malware known as a popular tool for building large scale botnets.
The Dofloo (aka AESDDoS) malware was first
[
,
,
,
] and it is known for allowing hackers to quickly assemble vast numbers of compromised machines used to create botnets that can launch DDoS attacks and — in the case of some variants —...
Hackers are scanning for Docker hosts with exposed APIs to use them for cryptocurrency mining by deploying malicious self-propagating Docker images infected with Monero miners and scripts that make use of Shodan to find other vulnerable targets.
The cryptojacking campaign targeting exposed Docker hosts was unearthed by Trend Micro researchers after a Docker image containing a Monero (XMR) cryptocurrency miner binary was deployed on one of their honeypots.
This type of attack is defi...
Hundreds of vulnerable and exposed Docker hosts are being abused in cryptojacking campaigns after being compromised with the help of exploits designed to take advantage of the CVE-2019-5736 runc vulnerability discovered last month.
The
triggers a container escape and it allows potential attackers to access the host filesystem upon execution of a malicious container, overwrite the runc binary present on the system, and run arbitrary commands on the container's host system.
...
runc, a building-block project for the container technologies used by many enterprises as well as public cloud providers, has patched a vulnerability that would allow root-level code-execution, container escape and access to the host filesystem.
Discovered by researchers Adam Iwaniuk and Borys Popławski, the vulnerability (CVE-2019-5736) “allows a malicious container to (with minimal user interaction) overwrite the host runc binary and thus gain root-level code execution on the host,”...
'Doomsday scenario' unless devops crowd walks this way
Aleksa Sarai, a senior software engineer at SUSE Linux GmbH, has disclosed a serious vulnerability affecting runc, the default container runtime for Docker, containerd, Podman, and CRI-O.
"While there are very few incidents that could qualify as a doomsday scenario for enterprise IT, a cascading set of exploits affecting a wide range of interconnected production systems qualifies...and that’s exactly what this vulnerability represents," said Scott McCarty, principal product manager for c...
A container breakout security flaw found in the runc container runtime allows malicious containers (with minimal user interaction) to overwrite the host runc binary and gain root-level code execution on the host machine.
is an open source command line utility designed to spawn and run containers and, at the moment, it is used as the default runtime for containers with Docker, containerd, Podman, and CRI-O.
According to Aleksa Sarai, Senior Software Engineer (Containers) SUSE Li...
'Doomsday scenario' unless devops crowd walks this way Docker invites elderly Windows Server apps to spend remaining days in supervised care
Aleksa Sarai, a senior software engineer at SUSE Linux GmbH, has disclosed a serious vulnerability affecting runc, the default container runtime for Docker, containerd, Podman, and CRI-O.
"While there are very few incidents that could qualify as a doomsday scenario for enterprise IT, a cascading set of exploits affecting a wide range of interconnected production systems qualifies...and that’s exactly what this vulnerability represents," said Scott McCarty, principal product manager for c...
Microsoft has fixed a vulnerability in Azure Container Instances called Azurescape that allowed a malicious container to take over containers belonging to other customers on the platform.
An adversary exploiting Azurescape could execute commands in the other users' containers and gain access to all their data deployed to the platform, the researchers say.
Microsoft has notified customers that were potentially impacted by Azurescape to change privileged credentials for containers depl...