logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2019-5736

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2019-5736

Description:
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
Last updated date:
02/02/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/12/2019
Reference url to background

https://github.com/q3k/cve-2019-5736-poc

Type:
exploit
Confidence:
HIGH
Date of publishing:
02/13/2019
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/14/2019
Reference url to background

https://github.com/jas502n/CVE-2019-5736

Type:
exploit
Confidence:
HIGH
Date of publishing:
02/15/2019
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/20/2019
Type:
exploit
Confidence:
HIGH
Date of publishing:
12/12/2019
Type:
exploit
Confidence:
HIGH
Date of publishing:
06/26/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
06/30/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/01/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/01/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/01/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/01/2021
Reference url to background

https://github.com/q3k/cve-2019-5736-poc

Type:
exploit
Confidence:
HIGH
Date of publishing:
07/01/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/01/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/01/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
12/16/2021
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2025

Privacy Policy