First published: Thu Jul 20 2017(Updated: )
Docker Registry before 2.6.2 in Docker Distribution does not properly restrict the amount of content accepted from a user, which allows remote attackers to cause a denial of service (memory consumption) via the manifest endpoint.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/docker-registry | <2.3.0~ | 2.3.0~ |
ubuntu/docker-registry | <2.6.2~ | 2.6.2~ |
<=2.6.1 | ||
=7.0 | ||
Docker Docker Registry | <=2.6.1 | |
Redhat Enterprise Linux Server | =7.0 | |
redhat/docker-registry | <2.6.2 | 2.6.2 |
go/github.com/docker/distribution | <2.7.0-rc.0 | 2.7.0-rc.0 |
debian/docker-registry | 2.6.2~ds1-2 2.6.2~ds1-2+deb10u1 2.7.1+ds2-7+deb11u1 2.8.2+ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11468 is a vulnerability in Docker Registry before version 2.6.2 in Docker Distribution that allows remote attackers to cause a denial of service (memory consumption) via the manifest endpoint.
CVE-2017-11468 has a severity rating of 7.5 out of 10, which is considered high.
To fix CVE-2017-11468, update Docker Registry to version 2.7.0-rc.0 or higher.
You can find more information about CVE-2017-11468 at the following references: [GitHub Pull Request](https://github.com/docker/distribution/pull/2340), [GitHub Release](https://github.com/docker/distribution/releases/tag/v2.6.2), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2017:2603).
The CWE ID for CVE-2017-11468 is 770.