CVE-2018-15514
01.09.2018, 01:29
HandleRequestAsync in Docker for Windows before 18.06.0-ce-rc3-win68 (edge) and before 18.06.0-ce-win72 (stable) deserialized requests over the \\.\pipe\dockerBackend named pipe without verifying the validity of the deserialized .NET objects. This would allow a malicious user in the "docker-users" group (who may not otherwise have administrator access) to escalate to administrator privileges.Enginsight
Vendor | Product | Version |
---|---|---|
docker | docker | 1.10.0.0-0 |
docker | docker | 1.10.1.42-1 |
docker | docker | 1.10.2.12 |
docker | docker | 1.10.2.14 |
docker | docker | 1.10.4.0 |
docker | docker | 1.10.6 |
docker | docker | 1.11.0 |
docker | docker | 1.11.0:beta10 |
docker | docker | 1.11.0:beta7 |
docker | docker | 1.11.0:beta8 |
docker | docker | 1.11.0:beta9 |
docker | docker | 1.11.1:beta11 |
docker | docker | 1.11.1:beta11b |
docker | docker | 1.11.1:beta12 |
docker | docker | 1.11.1:beta13 |
docker | docker | 1.11.1:beta14 |
docker | docker | 1.11.2:beta15 |
docker | docker | 1.12.0 |
docker | docker | 1.12.0:beta21 |
docker | docker | 1.12.0:beta22 |
docker | docker | 1.12.0:rc2-beta16 |
docker | docker | 1.12.0:rc2-beta17 |
docker | docker | 1.12.0:rc3-beta18 |
docker | docker | 1.12.0:rc3-beta18.1 |
docker | docker | 1.12.0:rc4-beta19 |
docker | docker | 1.12.0:rc4-beta20 |
docker | docker | 1.12.1 |
docker | docker | 1.12.1:beta24 |
docker | docker | 1.12.1:beta25 |
docker | docker | 1.12.1:beta26 |
docker | docker | 1.12.1:beta29.1 |
docker | docker | 1.12.1:rc1-beta23 |
docker | docker | 1.12.2:beta29.2 |
docker | docker | 1.12.2:rc1-beta27 |
docker | docker | 1.12.2:rc3-beta28 |
docker | docker | 1.12.3 |
docker | docker | 1.12.3:beta29.3 |
docker | docker | 1.12.3:beta30 |
docker | docker | 1.12.3:rc1-beta29 |
docker | docker | 1.12.5 |
docker | docker | 1.13.0 |
docker | docker | 1.13.0:beta38 |
docker | docker | 1.13.0:beta39 |
docker | docker | 1.13.0:rc2-beta31 |
docker | docker | 1.13.0:rc3-beta32 |
docker | docker | 1.13.0:rc3-beta32.1 |
docker | docker | 1.13.0:rc3-beta33 |
docker | docker | 1.13.0:rc4-beta34 |
docker | docker | 1.13.0:rc5-beta35 |
docker | docker | 1.13.0:rc6-beta36 |
docker | docker | 1.13.0:rc7-beta37 |
docker | docker | 1.13.1 |
docker | docker | 1.13.1:rc1-beta40 |
docker | docker | 1.13.1:rc2-beta41 |
docker | docker | 17.0.4:win7 |
docker | docker | 17.0.5:win9 |
docker | docker | 17.03.0 |
docker | docker | 17.03.0:rc1-win1 |
docker | docker | 17.03.1:win12 |
docker | docker | 17.04.0:win6 |
docker | docker | 17.06.0:win13 |
docker | docker | 17.06.0:win14 |
docker | docker | 17.06.0:win15 |
docker | docker | 17.06.0:win16 |
docker | docker | 17.06.0:win17 |
docker | docker | 17.06.0:win18 |
docker | docker | 17.06.1:rc1-win20 |
docker | docker | 17.06.1:rc1-win24 |
docker | docker | 17.06.2:win27 |
docker | docker | 17.07.0:rc1-win21 |
docker | docker | 17.07.0:rc2-win22 |
docker | docker | 17.07.0:rc3-win23 |
docker | docker | 17.07.0:rc4-win25 |
docker | docker | 17.07.0:win26 |
docker | docker | 17.09.0:rc1-win28 |
docker | docker | 17.09.0:rc2-win29 |
docker | docker | 17.09.0:rc3-win30 |
docker | docker | 17.09.0:win31 |
docker | docker | 17.09.0:win32 |
docker | docker | 17.09.0:win33 |
docker | docker | 17.09.0:win34 |
docker | docker | 17.09.1:win42 |
docker | docker | 17.10.0:win36 |
docker | docker | 17.11.0:rc2-win37 |
docker | docker | 17.11.0:rc3-win38 |
docker | docker | 17.11.0:rc4-win39 |
docker | docker | 17.11.0:win40 |
docker | docker | 17.12.0:rc2-win41 |
docker | docker | 17.12.0:rc3-win43 |
docker | docker | 17.12.0:rc4-win44 |
docker | docker | 17.12.0:win45 |
docker | docker | 17.12.0:win46 |
docker | docker | 17.12.0:win47 |
docker | docker | 18.01.0:win48 |
docker | docker | 18.02.0:rc1-win50 |
docker | docker | 18.02.0:rc2-win51 |
docker | docker | 18.02.0:win52 |
docker | docker | 18.03.0:rc3-win56 |
docker | docker | 18.03.0:win58 |
docker | docker | 18.03.0:win59 |
docker | docker | 18.03.1:win65 |
docker | docker | 18.04.0:rc2-win61 |
docker | docker | 18.05.0:rc1-win63 |
docker | docker | 18.05.0:win66 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References