// For flags

CVE-2019-0204

mesos: docker image code execution

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A specifically crafted Docker image running under the root user can overwrite the init helper binary of the container runtime and/or the command executor in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.2, 1.6.0 to 1.6.1, and 1.7.0 to 1.7.1. A malicious actor can therefore gain root-level code execution on the host.

Una imagen Docker especialmente manipulada que se ejecuta bajo un usuario root puede sobrescribir el binario init helper del tiempo de ejecución del contenedor y/o del ejecutor de comandos en Apache Mesos, en versiones pre-1.4.x, de 1.4.0 a 1.4.2, de 1.5.0 a 1.5.2, de 1.6.0 a 1.6.1 y de 1.7.0 a 1.7.1. Un actor malicioso puede, por lo tanto, lograr la ejecución de código de nivel root en el host.

A flaw was found in Docker image running under root user, where it is possible to overwrite the init helper binary of the container runtime or the command executor in Apache Mesos. A malicious user could use this flaw to gain root-level code execution on the host.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-11-14 CVE Reserved
  • 2019-03-25 CVE Published
  • 2023-11-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-250: Execution with Unnecessary Privileges
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Mesos
Search vendor "Apache" for product "Mesos"
>= 1.4.0 < 1.4.3
Search vendor "Apache" for product "Mesos" and version " >= 1.4.0 < 1.4.3"
-
Affected
Apache
Search vendor "Apache"
Mesos
Search vendor "Apache" for product "Mesos"
>= 1.5.0 < 1.5.3
Search vendor "Apache" for product "Mesos" and version " >= 1.5.0 < 1.5.3"
-
Affected
Apache
Search vendor "Apache"
Mesos
Search vendor "Apache" for product "Mesos"
>= 1.6.0 < 1.6.2
Search vendor "Apache" for product "Mesos" and version " >= 1.6.0 < 1.6.2"
-
Affected
Apache
Search vendor "Apache"
Mesos
Search vendor "Apache" for product "Mesos"
>= 1.7.0 < 1.7.2
Search vendor "Apache" for product "Mesos" and version " >= 1.7.0 < 1.7.2"
-
Affected
Apache
Search vendor "Apache"
Mesos
Search vendor "Apache" for product "Mesos"
1.8.0
Search vendor "Apache" for product "Mesos" and version "1.8.0"
dev
Affected
Redhat
Search vendor "Redhat"
Fuse
Search vendor "Redhat" for product "Fuse"
7.5.0
Search vendor "Redhat" for product "Fuse" and version "7.5.0"
-
Affected