Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://secunia.com/advisories/60241 | third party advisory |
http://secunia.com/advisories/60171 | third party advisory |
https://docs.docker.com/v1.3/release-notes/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/11/24/5 | mailing list |