First published: Wed Nov 26 2014(Updated: )
Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/docker | <1.3 | 1.3 |
Python Docker | <1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5282 is classified as a medium severity vulnerability allowing potential redirection of images.
To remediate CVE-2014-5282, upgrade Docker to version 1.3 or later.
CVE-2014-5282 affects all Docker versions prior to 1.3.
CVE-2014-5282 allows attackers to load untrusted images and redirect to another image.
Yes, CVE-2014-5282 can be exploited by remote attackers through the loading of untrusted images.