CVE-2019-5736

Scores

EPSS

0.553medium55.3%
0%20%40%60%80%100%

Percentile: 55.3%

CVSS

7.7high3.x
0246810

CVSS Score: 7.7/10

All CVSS Scores

CVSS 3.x
7.7

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

CVSS 2.0
9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Description

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

astradebiannvdredhatubuntu

CWEs

CWE-672CWE-78

Related Vulnerabilities

Exploits

Exploit ID: 46359

Source: exploitdb

URL: https://www.exploit-db.com/exploits/46359

Exploit ID: 46369

Source: exploitdb

URL: https://www.exploit-db.com/exploits/46369

Recommendations

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2019:0975

Source: nvd

Before applying this update, make sure all previously released errata relevant to your system have been applied.
See the following documentation for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update.
For OpenShift Container Platform 3.4:
https://docs.openshift.com/container-platform/3.4/release_notes/ocp_3_4_release_notes.html
For OpenShift Container Platform 3.5:
https://docs.openshift.com/container-platform/3.5/release_notes/ocp_3_5_release_notes.html
For OpenShift Container Platform 3.6:
https://docs.openshift.com/container-platform/3.6/release_notes/ocp_3_6_release_notes.html
For OpenShift Container Platform 3.7:
https://docs.openshift.com/container-platform/3.7/release_notes/ocp_3_7_release_notes.html
This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/articles/11258.

URL: https://access.redhat.com/errata/RHSA-2019:0408

Source: nvd

The References section of this erratum contains a link to download CDK 3.7.0-1 (you must log in to download the update).
Instructions are provided in the Red Hat Container Development Kit Getting Started Guide linked in the References section.

URL: https://access.redhat.com/errata/RHSA-2019:0401

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2019:0304

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2019:0303

Vulnerable Software (42)

Type: Configuration

Product: docker

Operating System: rhel

Trait:
{  "fixed": "1.13.1-91.git07f3374.el7"}

Source: redhat

Type: Configuration

Product: docker

Operating System: rhel

Trait:
{  "fixed": "1.12.6-79.git5680db5.el7"}

Source: redhat

Type: Configuration

Product: docker

Operating System: rhel

Trait:
{  "fixed": "1.12.6-79.git5680db5.el7"}

Source: redhat

Type: Configuration

Product: docker

Operating System: rhel

Trait:
{  "fixed": "1.12.6-79.git5680db5.el7"}

Source: redhat

Type: Configuration

Product: docker

Operating System: rhel

Trait:
{  "fixed": "1.12.6-79.git5680db5.el7"}

Source: redhat

Type: Configuration

Product: docker.io

Operating System: ubuntu bionic 18.04

Trait:
{  "fixed": "18.06.1-0ubuntu1.2~18.04.1"}

Source: ubuntu

Type: Configuration

Product: docker.io

Operating System: ubuntu cosmic 18.10

Trait:
{  "fixed": "18.06.1-0ubuntu1.2"}

Source: ubuntu

Type: Configuration

Product: docker.io

Operating System: ubuntu disco 19.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: docker.io

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: docker.io

Operating System: ubuntu xenial 16.04

Trait:
{  "fixed": "18.06.1-0ubuntu1.2~16.04.1"}

Source: ubuntu

Type: Configuration

Product: lxc

Operating System: altlinux

Trait:
{  "fixed": "0:4.0.0-alt1"}

Source: redhat

Type: Configuration

Product: lxc

Operating System: debian

Trait:
{  "fixed": "1:3.1.0+really3.0.3-4"}

Source: debian

Type: Configuration

Product: lxc

Operating System: astra 1.6.5

Trait:
{  "unaffected": true}

Source: astra

Type: Configuration

Product: lxc-devel

Operating System: altlinux

Trait:
{  "fixed": "0:4.0.0-alt1"}

Source: redhat

Type: Configuration

Product: lxc-libs

Operating System: altlinux

Trait:
{  "fixed": "0:4.0.0-alt1"}

Source: redhat

Type: Configuration

Product: pam0_cgfs

Operating System: altlinux

Trait:
{  "fixed": "0:4.0.0-alt1"}

Source: redhat

Type: Configuration

Product: runc

Operating System: debian

Trait:
{  "fixed": "1.0.0~rc6+dfsg1-2"}

Source: debian

Type: Configuration

Product: runc

Operating System: ubuntu bionic 18.04

Trait:
{  "fixed": "1.0.0~rc4+dfsg1-6ubuntu0.18.04.1"}

Source: ubuntu

Type: Configuration

Product: runc

Operating System: ubuntu cosmic 18.10

Trait:
{  "fixed": "1.0.0~rc4+dfsg1-6ubuntu0.18.10.1"}

Source: ubuntu

Type: Configuration

Product: runc

Operating System: ubuntu xenial 16.04

Trait:
{  "fixed": "1.0.0~rc2+docker1.13.1-0ubuntu1~16.04.1"}

Source: ubuntu