First published: Fri May 08 2020(Updated: )
An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/docker | <19.03.11 | 19.03.11 |
debian/docker.io | 18.09.1+dfsg1-7.1+deb10u3 20.10.5+dfsg1-1+deb11u2 20.10.24+dfsg1-1 20.10.25+dfsg1-1 20.10.25+dfsg1-2 | |
Docker | <19.03.11 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Debian Debian Linux | =10.0 | |
Broadcom Brocade SANnav | ||
IBM InfoSphere Guardium z/OS | <=10.5 | |
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.0 | |
IBM InfoSphere Guardium z/OS | <=11.1 | |
IBM InfoSphere Guardium z/OS | <=11.2 | |
IBM InfoSphere Guardium z/OS | <=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-13401.
CVE-2020-13401 has a severity level of high.
IBM Security Guardium versions up to 11.3 and Docker Engine versions up to 19.03.11 are affected by CVE-2020-13401.
CVE-2020-13401 allows an attacker to perform man-in-the-middle attacks and gain access to the communication channel between endpoints.
To fix CVE-2020-13401, update Docker Engine to version 19.03.11.