[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2016-3697

Date: (C)2016-06-02   (M)2017-10-12
 
CVSS Score: 2.1Access Vector: LOCAL
Exploitability Subscore: 3.9Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: NONE
 Availability: NONE











libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.

Reference:
GLSA-201612-28
RHSA-2016:1034
RHSA-2016:2634
https://github.com/docker/docker/issues/21436
https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
https://github.com/opencontainers/runc/pull/708
https://github.com/opencontainers/runc/releases/tag/v0.1.0
openSUSE-SU-2016:1417

CPE    1
cpe:/o:novell:opensuse:13.2
CWE    1
CWE-264
OVAL    3
oval:org.secpod.oval:def:1501474
oval:org.secpod.oval:def:110613
oval:org.secpod.oval:def:1501478

© 2013 SecPod Technologies