Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1168436 | Issue Tracking Third Party Advisory | 
| https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ | |
| https://bugzilla.redhat.com/show_bug.cgi?id=1168436 | Issue Tracking Third Party Advisory | 
| https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ | 
Configurations
                    History
                    21 Nov 2024, 02:11
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=1168436 - Issue Tracking, Third Party Advisory | |
| References | () https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ - | 
07 Nov 2023, 02:20
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
 | 
Information
                Published : 2018-02-06 16:29
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5282
Mitre link : CVE-2014-5282
CVE.ORG link : CVE-2014-5282
JSON object : View
Products Affected
                docker
- docker
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
