CVE-2018-9862

util.c in runV 1.0.0 for Docker mishandles a numeric username, which allows attackers to obtain root access by leveraging the presence of an initial numeric value on an /etc/passwd line, and then issuing a "docker exec" command with that value in the -u argument, a similar issue to CVE-2016-3697.
References
Link Resource
http://www.securityfocus.com/bid/103738 Broken Link Third Party Advisory VDB Entry
https://github.com/hyperhq/hyperstart/pull/348 Patch Third Party Advisory
http://www.securityfocus.com/bid/103738 Broken Link Third Party Advisory VDB Entry
https://github.com/hyperhq/hyperstart/pull/348 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:hyper:runv:1.0.0:*:*:*:*:docker:*:*

History

21 Nov 2024, 04:15

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103738 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103738 - Broken Link, Third Party Advisory, VDB Entry
References () https://github.com/hyperhq/hyperstart/pull/348 - Patch, Third Party Advisory () https://github.com/hyperhq/hyperstart/pull/348 - Patch, Third Party Advisory

Information

Published : 2018-04-09 16:29

Updated : 2024-11-21 04:15


NVD link : CVE-2018-9862

Mitre link : CVE-2018-9862

CVE.ORG link : CVE-2018-9862


JSON object : View

Products Affected

hyper

  • runv
CWE
CWE-838

Inappropriate Encoding for Output Context