HomeDockerCVE-2019-5736

CVE-2019-5736

HIGH
8.6CVSS
Published: 2019-02-11
Updated: 2024-11-21
AI Analysis

Description

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
local
Complexity
low
Privileges
none
User Action
required
Scope
changed
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-78

Metadata

Primary Vendor
DOCKER
Published
2/11/2019
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

docker : dockerlinuxfoundation : runclinuxfoundation : runclinuxfoundation : runclinuxfoundation : runclinuxfoundation : runclinuxfoundation : runclinuxfoundation : runcredhat : container_development_kitredhat : openshiftredhat : openshiftredhat : openshiftredhat : openshiftredhat : enterprise_linuxredhat : enterprise_linux_servergoogle : kubernetes_enginelinuxcontainers : lxchp : onespherenetapp : hci_management_nodenetapp : solidfireapache : mesosapache : mesosapache : mesosapache : mesosopensuse : backports_sleopensuse : backports_sleopensuse : leapopensuse : leapopensuse : leapd2iq : kubernetes_engined2iq : dc\/osd2iq : dc\/osd2iq : dc\/osfedoraproject : fedorafedoraproject : fedoracanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxmicrofocus : service_management_automationmicrofocus : service_management_automationmicrofocus : service_management_automationmicrofocus : service_management_automation

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2019-5736 | HIGH Severity | CVEDatabase.com | CVEDatabase.com