CVE-2017-16539Sensitive Information Exposure in Moby Moby

Severity
5.9MEDIUMNVD
EPSS
0.4%
top 36.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 4
Latest updateMay 17

Description

The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages2 packages

Gogithub.com/moby_moby< 17.12.0-ce
NVDmobyproject/moby17.03.2

Patches

🔴Vulnerability Details

4
GHSA
Docker Moby /proc/scsi Path Exposure Allows Host Data Loss (SCSI MICDROP)2022-05-17
OSV
Docker Moby /proc/scsi Path Exposure Allows Host Data Loss (SCSI MICDROP)2022-05-17
OSV
CVE-2017-16539: The DefaultLinuxSpec function in oci/defaults2017-11-04
CVEList
CVE-2017-16539: The DefaultLinuxSpec function in oci/defaults2017-11-04

📋Vendor Advisories

2
Red Hat
docker: The DefaultLinuxSpec function does not block /proc/scsi pathnames2017-11-03
Debian
CVE-2017-16539: docker.io - The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-...2017

💬Community

1
Bugzilla
CVE-2017-16539 docker: The DefaultLinuxSpec function does not block /proc/scsi pathnames2017-11-22
CVE-2017-16539 — Sensitive Information Exposure | cvebase