CVE-2019-5736
high-risk
Published 2019-02-11
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
Do I need to act?
!
59.2% chance of exploitation in next 30 days
EPSS score — higher than 41% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.6/10
High
LOCAL
/ LOW complexity
Affected Products (20)
Runc
Runc
Runc
Runc
Runc
Runc
Runc
Lxc
Affected Vendors
References (132)
Third Party Advisory
http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-...
and 112 more references
68
/ 100
high-risk
Severity
26/34 · High
Exploitability
18/34 · Moderate
Exposure
24/34 · High