CVE-2014-8179Improper Input Validation in Docker CS Engine

Severity
7.5HIGHNVD
EPSS
1.6%
top 18.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 17
Latest updateMay 17

Description

Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

NVDdocker/cs_engine< 1.6.2-cs7
CVEListV5docker/docker_enginebefore 1.8.3
CVEListV5docker/cs_docker_enginebefore 1.6.2-CS7
NVDdocker/docker< 1.8.3
debiandebian/docker.io< docker.io 1.8.3~ds1-1 (bookworm)

🔴Vulnerability Details

2
GHSA
GHSA-7w47-v4xv-5crg: Docker Engine before 12022-05-17
OSV
CVE-2014-8179: Docker Engine before 12019-12-17

📋Vendor Advisories

2
Red Hat
docker: Manifest validation and parsing logic errors allow pull-by-digest validation bypass2015-10-13
Debian
CVE-2014-8179: docker.io - Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not proper...2014

💬Community

2
Bugzilla
CVE-2014-8178 CVE-2014-8179 docker-io: various flaws [fedora-all]2015-10-13
Bugzilla
CVE-2014-8179 docker: Manifest validation and parsing logic errors allow pull-by-digest validation bypass2015-10-13