Advisory Details

July 26th, 2024

Docker Desktop Daemon CLI External Control of File Path Denial-of-Service Vulnerability

ZDI-24-966
ZDI-CAN-23533

CVE ID CVE-2024-5652
CVSS SCORE 6.1, AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
AFFECTED VENDORS Docker
AFFECTED PRODUCTS Desktop
VULNERABILITY DETAILS

This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Docker Desktop. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the Daemon CLI. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

ADDITIONAL DETAILS Docker has issued an update to correct this vulnerability. More details can be found at:
https://docs.docker.com/desktop/release-notes/#for-windows-5
DISCLOSURE TIMELINE
  • 2024-05-22 - Vulnerability reported to vendor
  • 2024-07-26 - Coordinated public release of advisory
  • 2024-08-15 - Advisory Updated
CREDIT Hashim Jawad (@ihack4falafel)
BACK TO ADVISORIES