[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Arbitrary code execution vulnerability in docker via a symlink or hard link attack

ID: oval:org.secpod.oval:def:24745Date: (C)2015-06-08   (M)2022-09-09
Class: VULNERABILITYFamily: unix




The host is installed with docker in RHEL 7 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle symbolic and hardlink issues. Successful exploitation could allow attackers to write to arbitrary files and execute arbitrary code.

Platform:
Red Hat Enterprise Linux 7
Product:
docker
Reference:
CVE-2014-6407
CVE    1
CVE-2014-6407
CPE    5
cpe:/a:docker:docker:1.0.0
cpe:/o:redhat:enterprise_linux:7
cpe:/a:docker:docker
cpe:/a:docker:docker:1.3.1
...

© SecPod Technologies