CVE-2014-5279

The Docker daemon managed by boot2docker 1.2 and earlier improperly enables unauthenticated TCP connections by default, which makes it easier for remote attackers to gain privileges or execute arbitrary code from children containers.
Configurations

Configuration 1 (hide)

cpe:2.3:o:boot2docker:boot2docker:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:20

Type Values Removed Values Added
References
  • {'url': 'https://groups.google.com/forum/#!msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ', 'name': 'https://groups.google.com/forum/#!msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ', 'tags': ['Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ -

Information

Published : 2018-02-06 16:29

Updated : 2024-02-28 16:25


NVD link : CVE-2014-5279

Mitre link : CVE-2014-5279

CVE.ORG link : CVE-2014-5279


JSON object : View

Products Affected

boot2docker

  • boot2docker
CWE
CWE-284

Improper Access Control