Advisory Details

August 10th, 2016

Joyent Smart Data Center Docker API Zone Escape Privilege Escalation Vulnerability

ZDI-16-466
ZDI-CAN-3701

CVE ID
CVSS SCORE 6.9, AV:L/AC:M/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Joyent
AFFECTED PRODUCTS Smart Data Center
VULNERABILITY DETAILS


This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Joyent Smart Data Center. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within a Docker remote API for this product. An attacker can create a device node that is the same as /dev/kmem, which can overwrite arbitrary kernel memory. An attacker can leverage this vulnerability to escalate privileges to escape a zone and achieve privileged execution on the Smart Data Center.

ADDITIONAL DETAILS
DISCLOSURE TIMELINE
  • 2016-04-14 - Vulnerability reported to vendor
  • 2016-08-10 - Coordinated public release of advisory
CREDIT Ben Murphy
BACK TO ADVISORIES