First published: Wed Dec 10 2014(Updated: )
A problem was reported by Docker Inc. whereby a malicious image could overwrite arbitrary portions of the host filesystem by including absolute symlinks. From the upstream report: "Path traversal attacks are possible in the processing of absolute symlinks. In checking symlinks for traversals, only relative links were considered. This allowed path traversals to exist where they should have otherwise been prevented. This was exploitable via both archive extraction and through volume mounts. This vulnerability allowed malicious images or builds from malicious Dockerfiles to write files to the host system and escape containerization, leading to privilege escalation."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Docker | <1.3.3 | |
go/github.com/docker/docker | <1.3.3 | 1.3.3 |
<1.3.3 | ||
redhat/docker | <1.3.3 | 1.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9356 is a path traversal vulnerability in Docker before version 1.3.3.
The severity of CVE-2014-9356 is high, with a CVSS score of 8.6.
CVE-2014-9356 allows remote attackers to write to arbitrary files and bypass container protection mechanisms using a symlink in an image or Dockerfile.
Versions of Docker before 1.3.3 are affected by CVE-2014-9356.
To fix CVE-2014-9356, update Docker to version 1.3.3 or later.