vulnerability
Docker CE: Deserialization of Untrusted Data (CVE-2018-15514)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:P/I:P/A:P) | Sep 1, 2018 | Nov 25, 2019 | Nov 27, 2024 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
Sep 1, 2018
Added
Nov 25, 2019
Modified
Nov 27, 2024
Description
HandleRequestAsync in Docker for Windows before 18.06.0-ce-rc3-win68 (edge) and before 18.06.0-ce-win72 (stable) deserialized requests over the \\.\pipe\dockerBackend named pipe without verifying the validity of the deserialized .NET objects. This would allow a malicious user in the "docker-users" group (who may not otherwise have administrator access) to escalate to administrator privileges.
Solution
docker-ce-upgrade-18_06_0
References
- CVE-2018-15514
- https://attackerkb.com/topics/CVE-2018-15514
- URL-http://www.securityfocus.com/bid/105202
- URL-https://docs.docker.com/docker-for-windows/edge-release-notes/
- URL-https://docs.docker.com/docker-for-windows/release-notes/
- URL-https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-exploiting-an-elevation-of-privilege-in-docker-for-windows.html
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.