CVE-2018-15664

In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html
http://www.openwall.com/lists/oss-security/2019/05/28/1 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/08/21/1
http://www.securityfocus.com/bid/108507 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:1910
https://bugzilla.suse.com/show_bug.cgi?id=1096726 Exploit Issue Tracking Third Party Advisory
https://github.com/moby/moby/pull/39252 Issue Tracking Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-15664
https://usn.ubuntu.com/4048-1/
https://access.redhat.com/security/cve/cve-2018-15664 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html
http://www.openwall.com/lists/oss-security/2019/05/28/1 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/08/21/1
http://www.securityfocus.com/bid/108507 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:1910
https://bugzilla.suse.com/show_bug.cgi?id=1096726 Exploit Issue Tracking Third Party Advisory
https://github.com/moby/moby/pull/39252 Issue Tracking Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-15664
https://usn.ubuntu.com/4048-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:docker:docker:17.06.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.0-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.0-ce:rc3:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.0-ce:rc4:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.0-ce:rc5:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.1-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.1-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.1-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.1-ce:rc3:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.1-ce:rc4:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.2-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.06.2-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.07.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.07.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.07.0-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.07.0-ce:rc3:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.07.0-ce:rc4:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.09.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.09.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.09.0-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.09.0-ce:rc3:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.09.1-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.09.1-ce-:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.10.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.10.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.10.0-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.11.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.11.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.11.0-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.11.0-ce:rc3:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.11.0-ce:rc4:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.12.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.12.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.12.0-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.12.0-ce:rc3:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.12.0-ce:rc4:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.12.1-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.12.1-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:17.12.1-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.01.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.01.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.02.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.02.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.02.0-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.03.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.03.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.03.0-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.03.0-ce:rc3:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.03.0-ce:rc4:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.03.1-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.03.1-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.03.1-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.04.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.04.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.04.0-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.05.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.05.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.06.0-ce:*:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.06.0-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.06.0-ce:rc2:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.06.0-ce:rc3:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.06.1-ce:rc1:*:*:community:*:*:*
cpe:2.3:a:docker:docker:18.06.1-ce:rc2:*:*:community:*:*:*

History

21 Nov 2024, 03:51

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00066.html - () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00066.html -
References () http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html -
References () http://www.openwall.com/lists/oss-security/2019/05/28/1 - Mailing List, Exploit, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/05/28/1 - Exploit, Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2019/08/21/1 - () http://www.openwall.com/lists/oss-security/2019/08/21/1 -
References () http://www.securityfocus.com/bid/108507 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/108507 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2019:1910 - () https://access.redhat.com/errata/RHSA-2019:1910 -
References () https://bugzilla.suse.com/show_bug.cgi?id=1096726 - Issue Tracking, Exploit, Third Party Advisory () https://bugzilla.suse.com/show_bug.cgi?id=1096726 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/moby/moby/pull/39252 - Issue Tracking, Third Party Advisory () https://github.com/moby/moby/pull/39252 - Issue Tracking, Third Party Advisory
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-15664 - () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-15664 -
References () https://usn.ubuntu.com/4048-1/ - () https://usn.ubuntu.com/4048-1/ -

Information

Published : 2019-05-23 14:29

Updated : 2024-11-21 03:51


NVD link : CVE-2018-15664

Mitre link : CVE-2018-15664

CVE.ORG link : CVE-2018-15664


JSON object : View

Products Affected

docker

  • docker
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')