First published: Fri Dec 12 2014(Updated: )
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker | =1.3.0 | |
Docker | =1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6408 has a medium severity level as it allows remote attackers to modify container profiles.
To address CVE-2014-6408, upgrade Docker to version 1.3.2 or later where the vulnerability is patched.
CVE-2014-6408 affects Docker versions 1.3.0 and 1.3.1.
CVE-2014-6408 enables remote attackers to modify the default run profile of image containers.
While specific exploits for CVE-2014-6408 are not detailed, the vulnerability poses a risk for unauthorized access and manipulation of containers.