Language:
https://cbs.centos.org/koji/buildinfo?buildID=25136
Severity: High
ID: 130262
File Name: centos_docker_cve-2019-5736.nasl
Version: 1.2
Type: local
Agent: unix
Family: CentOS Local Security Checks
Published: 10/25/2019
Updated: 2/1/2022
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus
Risk Factor: Critical
Score: 10.0
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2019-5736
Risk Factor: High
Base Score: 8.6
Temporal Score: 8.2
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:centos:centos:runc
Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 2/11/2019
Vulnerability Publication Date: 2/11/2019
Metasploit (Docker Container Escape Via runC Overwrite)
CVE: CVE-2019-5736