7 CVE-2019-19921

Patch
 

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
https://nvd.nist.gov/vuln/detail/CVE-2019-19921

Categories

CWE-706 : Use of Incorrectly-Resolved Name or Reference
The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.

References

af854a3a-2127-422b-91ae-364da2661108 Patch

http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html
Broken Link Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0688
Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0695
Third Party Advisory
https://github.com/opencontainers/runc/issues/2197
Issue Tracking Patch Third Party Advisory
https://github.com/opencontainers/runc/pull/2190
Issue Tracking Third Party Advisory
https://github.com/opencontainers/runc/releases
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://security-tracker.debian.org/tracker/CVE-2019-19921
Third Party Advisory
https://security.gentoo.org/glsa/202003-21
Third Party Advisory
https://usn.ubuntu.com/4297-1/
Third Party Advisory

cve@mitre.org Patch

http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html
Broken Link Mailing List Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0688
Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0695
Third Party Advisory
https://github.com/opencontainers/runc/issues/2197
Issue Tracking Patch Third Party Advisory
https://github.com/opencontainers/runc/pull/2190
Issue Tracking Third Party Advisory
https://github.com/opencontainers/runc/releases
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://security-tracker.debian.org/tracker/CVE-2019-19921
Third Party Advisory
https://security.gentoo.org/glsa/202003-21
Third Party Advisory
https://usn.ubuntu.com/4297-1/
Third Party Advisory


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:* <= 0.1.1
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc9:*:*:*:*:*:*
Configuration 2
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
Configuration 3
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
Configuration 4
cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://github.com/opencontainers/runc/issues/2197
https://github.com/opencontainers/runc/issues/2197


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
159 Redirect Access to Libraries
Very High
177 Create files with the same name as files protected with a higher classification
Very High
48 Passing Local Filenames to Functions That Expect a URL
High
641 DLL Side-Loading
High


MITRE


Techniques

id description
T1036 Masquerading
T1574.002 Hijack Execution Flow:DLL Side-Loading
T1574.008 Hijack Execution Flow:Path Interception by Search Order Hijacking
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1017 Train users not to open email attachments or click unknown links (URLs). Such training fosters more secure habits within your organization and will limit many of the risks.
M1051 Update software regularly to include patches that fix DLL side-loading vulnerabilities.
M1022 Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.