CVE-2019-0204
mesos: docker image code execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A specifically crafted Docker image running under the root user can overwrite the init helper binary of the container runtime and/or the command executor in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.2, 1.6.0 to 1.6.1, and 1.7.0 to 1.7.1. A malicious actor can therefore gain root-level code execution on the host.
Una imagen Docker especialmente manipulada que se ejecuta bajo un usuario root puede sobrescribir el binario init helper del tiempo de ejecución del contenedor y/o del ejecutor de comandos en Apache Mesos, en versiones pre-1.4.x, de 1.4.0 a 1.4.2, de 1.5.0 a 1.5.2, de 1.6.0 a 1.6.1 y de 1.7.0 a 1.7.1. Un actor malicioso puede, por lo tanto, lograr la ejecución de código de nivel root en el host.
A flaw was found in Docker image running under root user, where it is possible to overwrite the init helper binary of the container runtime or the command executor in Apache Mesos. A malicious user could use this flaw to gain root-level code execution on the host.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-11-14 CVE Reserved
- 2019-03-25 CVE Published
- 2023-11-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-250: Execution with Unnecessary Privileges
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/107605 | Third Party Advisory | |
https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c%40%3Cdev.mesos.apache.org%3E | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:3892 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2019-0204 | 2019-11-14 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1692755 | 2019-11-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | >= 1.4.0 < 1.4.3 Search vendor "Apache" for product "Mesos" and version " >= 1.4.0 < 1.4.3" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | >= 1.5.0 < 1.5.3 Search vendor "Apache" for product "Mesos" and version " >= 1.5.0 < 1.5.3" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | >= 1.6.0 < 1.6.2 Search vendor "Apache" for product "Mesos" and version " >= 1.6.0 < 1.6.2" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | >= 1.7.0 < 1.7.2 Search vendor "Apache" for product "Mesos" and version " >= 1.7.0 < 1.7.2" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | 1.8.0 Search vendor "Apache" for product "Mesos" and version "1.8.0" | dev |
Affected
| ||||||
Redhat Search vendor "Redhat" | Fuse Search vendor "Redhat" for product "Fuse" | 7.5.0 Search vendor "Redhat" for product "Fuse" and version "7.5.0" | - |
Affected
|