CVE-2017-14992
openSUSE Security Advisory - openSUSE-SU-2025:15033-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Lack of content verification in Docker-CE (Also known as Moby) versions 1.12.6-0, 1.10.3, 17.03.0, 17.03.1, 17.03.2, 17.06.0, 17.06.1, 17.06.2, 17.09.0, and earlier allows a remote attacker to cause a Denial of Service via a crafted image layer payload, aka gzip bombing.
Una falta de verificación en Docker-CE (también conocido como Moby), en versiones 1.12.6-0, 1.10.3, 17.03.0, 17.03.1, 17.03.2, 17.06.0, 17.06.1, 17.06.2, 17.09.0 y anteriores, permite que un atacante remoto provoque una denegación de servicio (DoS) mediante un payload de capa de imagen modificado. Esto también se conoce como gzip bombing.
These are all security issues fixed in the govulncheck-vulndb-0.0.20250424T181457-1.1 package on the GA media of openSUSE Tumbleweed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-10-03 CVE Reserved
- 2017-11-01 CVE Published
- 2024-08-05 CVE Updated
- 2026-01-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (2)
| URL | Tag | Source |
|---|---|---|
| https://blog.cloudpassage.com/2017/10/13/discovering-docker-cve-2017-14992 | Third Party Advisory | |
| https://github.com/moby/moby/issues/35075 | Issue Tracking |
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| Docker Search vendor "Docker" | Docker Search vendor "Docker" for product "Docker" | <= 1.10.3 Search vendor "Docker" for product "Docker" and version " <= 1.10.3" | community |
Affected
| ||||||
| Docker Search vendor "Docker" | Docker Search vendor "Docker" for product "Docker" | 1.12.6-0 Search vendor "Docker" for product "Docker" and version "1.12.6-0" | community |
Affected
| ||||||
| Docker Search vendor "Docker" | Docker Search vendor "Docker" for product "Docker" | 17.03.0 Search vendor "Docker" for product "Docker" and version "17.03.0" | community |
Affected
| ||||||
| Docker Search vendor "Docker" | Docker Search vendor "Docker" for product "Docker" | 17.03.1 Search vendor "Docker" for product "Docker" and version "17.03.1" | community |
Affected
| ||||||
| Docker Search vendor "Docker" | Docker Search vendor "Docker" for product "Docker" | 17.03.2 Search vendor "Docker" for product "Docker" and version "17.03.2" | community |
Affected
| ||||||
| Docker Search vendor "Docker" | Docker Search vendor "Docker" for product "Docker" | 17.06.0 Search vendor "Docker" for product "Docker" and version "17.06.0" | community |
Affected
| ||||||
| Docker Search vendor "Docker" | Docker Search vendor "Docker" for product "Docker" | 17.06.1 Search vendor "Docker" for product "Docker" and version "17.06.1" | community |
Affected
| ||||||
| Docker Search vendor "Docker" | Docker Search vendor "Docker" for product "Docker" | 17.06.2 Search vendor "Docker" for product "Docker" and version "17.06.2" | community |
Affected
| ||||||
| Docker Search vendor "Docker" | Docker Search vendor "Docker" for product "Docker" | 17.09.0 Search vendor "Docker" for product "Docker" and version "17.09.0" | community |
Affected
| ||||||
