Lucene search

K
githubGitHub Advisory DatabaseGHSA-997C-FJ8J-RQ5H
HistoryFeb 15, 2022 - 1:57 a.m.

Arbitrary Code Execution

2022-02-1501:57:18
CWE-285
GitHub Advisory Database
github.com
15

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.014 Low

EPSS

Percentile

86.6%

Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.

Affected configurations

Vulners
Node
github.com\/docker\/dockerceRange<1.3.3
CPENameOperatorVersion
github.com/docker/dockerlt1.3.3

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.014 Low

EPSS

Percentile

86.6%