Showing posts with label docker. Show all posts
Showing posts with label docker. Show all posts
Severity Rating: MEDIUM
Software Affected
Docker Desktop Community version 2.3.0.2
Overview
A vulnerability has been reported in Windows Docker Desktop Service that
could allow an attacker to gain elevated privileges on a targeted system.

Description
This vulnerability exists in the Docker Desktop for Windows when
communicating as a client to child processes. An attacker could exploit
this vulnerability by connecting the affected software to a named pipe
which is set up by a malicious lower privilege process.

Successful exploitation of this vulnerability could allow the attacker to
impersonate the Docker Desktop Service account (SYSTEM) and execute
arbitrary system commands with the highest level privileges.

Solution
Apply updates as available on

Vendor Information
Docker

References
Docker

Zdnet
- -docker-desktop-for-windows/

CVE Name
CVE-2020-11492

Severity Rating: Medium
Software Affected:            
·         Docker Engine before 19.03.11
Overview:
A vulnerability has been reported in Docker Engine which could allow an
attacker to obtain sensitive information, or cause a denial of service
condition on the targeted system.
Description
This Vulnerability exists in Docker Engine due to improper handling of the
Configuration in the Docker Engine software. A remote attacker could
exploit this vulnerability by sending the rogue router advertisements with
CAP_NET_RAW capability to the attacker-controlled malicious container and
reconfigure the host to redirect the traffic of the host of the attacker
controlled container. 
Successful exploitation of this vulnerability may result to obtain
sensitive information, or cause a denial of service to conduct
man-in-the-middle (MitM) attacks.

Solution
Apply appropriate patches as mentioned in Docker Engine Bulletin:

References:
Vendor Information
Docker Docs
Openwall

CVE Name
CVE-2020-13401

© Copyright 2020. Designed By Templateify

© Copyright 2020. Ud64

Scroll to Top