CVE-2015-1843
docker: regression of CVE-2014-5277
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Red Hat docker package before 1.5.0-28, when using the --add-registry option, falls back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. NOTE: this vulnerability exists because of a CVE-2014-5277 regression.
El paquete Red Hat docker anterior a 1.5.0-28, cuando utiliza la opción --add-registry, vuelve a HTTP cuando falla la conexión HTTPS al registro, lo que permite a atacantes man-in-the-middle realizar ataques de degradación y obtener la autenticación y datos de imágenes mediante el aprovechamiento de una posición de la red entre el cliente y el registro para bloquear el trafico HTTPS. NOTA: esta vulnerabilidad existe debido a una regresión de CVE-2014-5277.
It was found that the fix for the CVE-2014-5277 issue was incomplete: the docker client could under certain circumstances erroneously fall back to HTTP when an HTTPS connection to a registry failed. This could allow a man-in-the-middle attacker to obtain authentication and image data from traffic sent from a client to the registry.
Docker is a service providing container management on Linux. It was found that the fix for the CVE-2014-5277 issue was incomplete: the docker client could under certain circumstances erroneously fall back to HTTP when an HTTPS connection to a registry failed. This could allow a man-in-the-middle attacker to obtain authentication and image data from traffic sent from a client to the registry.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-02-17 CVE Reserved
- 2015-04-02 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-494: Download of Code Without Integrity Check
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/73936 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2015-0776.html | 2016-07-26 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1206443 | 2015-04-02 | |
https://access.redhat.com/security/cve/CVE-2015-1843 | 2015-04-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Docker Search vendor "Redhat" for product "Docker" | <= 1.5.0-27 Search vendor "Redhat" for product "Docker" and version " <= 1.5.0-27" | - |
Affected
|