CVE-2016-3697

Severity
7.8HIGH
EPSS
0.1%
top 82.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 1
Latest updateDec 20

Description

libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Debianrunc< 0.1.0+dfsg-1+3
NVDdocker/docker1.11.1

Patches

🔴Vulnerability Details

5
OSV
Privilege Elevation in runc2021-12-20
GHSA
Privilege Elevation in runc2021-12-20
OSV
Privilege escalation in github.com/opencontainers/runc2021-04-14
CVEList
CVE-2016-3697: libcontainer/user/user2016-06-01
OSV
CVE-2016-3697: libcontainer/user/user2016-06-01

📋Vendor Advisories

3
Microsoft
libcontainer/user/user.go in runC before 0.1.0 as used in Docker before 1.11.2 improperly treats a numeric UID as a potential username which allows local users to gain privileges via a numeric usernam2016-06-14
Red Hat
docker: privilege escalation via confusion of usernames and UIDs2016-04-22
Debian
CVE-2016-3697: docker.io - libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2,...2016

💬Community

2
Bugzilla
CVE-2016-3697 docker: privilege escalation via confusion of usernames and UIDs [fedora-all]2016-04-22
Bugzilla
CVE-2016-3697 docker: privilege escalation via confusion of usernames and UIDs2016-04-22
CVE-2016-3697 (HIGH CVSS 7.8) | libcontainer/user/user.go in runC b | cvebase.io