
CVE-2014-5277 – Docker Privilege Escalation
https://notcve.org/view.php?id=CVE-2014-5277
17 Nov 2014 — Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. Docker anterior a 1.3.1 y docker-py anterior a 0.5.3 recurre a HTTP cuando la conexión HTTPS del registro falla, lo que permite a atacantes realizar ataques de man-in-the-middle y ataques de dow... • http://lists.opensuse.org/opensuse-updates/2014-11/msg00048.html • CWE-17: DEPRECATED: Code •

CVE-2014-3499 – docker: systemd socket activation results in privilege escalation
https://notcve.org/view.php?id=CVE-2014-3499
01 Jul 2014 — Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors. Docker 1.0.0 utiliza permisos de lectura universal y escritura universal en el socket de gestión, lo que permite a usuarios locales ganar privilegios a través de vectores no especificados. Docker is a service providing container management on Linux. It was found that the socket used to manage the Docker service was world readable and writable. A local... • http://rhn.redhat.com/errata/RHSA-2014-0820.html • CWE-264: Permissions, Privileges, and Access Controls CWE-266: Incorrect Privilege Assignment •