Vulnerability Details : CVE-2016-8649
lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.
Products affected by CVE-2016-8649
- cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*
- cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-8649
2.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-8649
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
9.1
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
2.3
|
6.0
|
NIST |
CWE ids for CVE-2016-8649
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-8649
-
http://www.securityfocus.com/bid/94498
LXC CVE-2016-8649 Directory Traversal VulnerabilityThird Party Advisory;VDB Entry
-
https://bugzilla.redhat.com/show_bug.cgi?id=1398242
1398242 – (CVE-2016-8649) CVE-2016-8649 lxc: lxc-attach to malicious container allows access to hostIssue Tracking;Patch
-
https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c
attach: do not send procfd to attached process · lxc/lxc@81f466d · GitHubPatch;Vendor Advisory
-
https://security-tracker.debian.org/tracker/CVE-2016-8649
CVE-2016-8649Third Party Advisory;VDB Entry
-
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345
Bug #1639345 “lxc-attach to malicious container allows access to...” : Bugs : lxc package : UbuntuThird Party Advisory
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465
#845465 - lxc: CVE-2016-8649: attach: do not send procfd to attached process - Debian Bug report logsThird Party Advisory
Jump to