First published: Fri Dec 12 2014(Updated: )
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker | <=1.3.1 | |
Docker | =1.0.0 | |
Docker | =1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6407 has a high severity rating due to the potential for remote code execution and unauthorized file access.
To fix CVE-2014-6407, upgrade to Docker version 1.3.2 or later.
CVE-2014-6407 affects Docker versions 1.0.0 to 1.3.1.
CVE-2014-6407 allows attackers to exploit symlink or hard link attacks to write to arbitrary files.
CVE-2014-6407 was reported in December 2014.