NIC-CERT/2018-05/041 Dated: 03-05-2018 CVE IDs: CVE-2018-8115 Severity: Critical
A remote code execution vulnerability exists when the Windows Host Compute Service Shim (hcsshim) library fails to properly validate input while importing a container image.
To exploit the vulnerability, an attacker would place malicious code in a specially crafted container image which, if an authenticated administrator imported (pulled), could cause a container management service utilizing the Host Compute Service Shim library to execute malicious code on the Windows host. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.
This security update addresses the vulnerability by correcting how Windows Host Compute Service Shim validates input from container images.
An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.
This security update affects Windows Host Compute Service Shim (hcsshim). Versions prior to Windows Host Compute Service Shim 0.6.10 are vulnerable.
Affected users are requested to download the appropriate security updates from the “Download” section in “Affected Products” section by referring the following link:
2. https://www.zdnet.com/article/windows-security-microsoft-issues-fix-for-critical-docker-tool-flaw-so- patch-now/
|Remote Code Execution Vulnerability in Samba 3.5.0 Onwards.|
|Petya Ransomware Variant June 2017.|