NewsSecurity Vulnerabilities

Docker Desktop Daemon CLI External Control of File Path Denial-of-Service Vulnerability [CVE-2024-5652]

CVE number = CVE-2024-5652

This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Docker Desktop.

An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the Daemon CLI. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations.

An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

Docker has issued an update to correct this vulnerability.
https://docs.docker.com/desktop/release-notes/#for-windows-5

Jason Davies

I am one of the editors here at www.systemtek.co.uk I am a UK based technology professional, with an interest in computer security and telecoms.

One thought on “Docker Desktop Daemon CLI External Control of File Path Denial-of-Service Vulnerability [CVE-2024-5652]

  • Hi Jason, Can you review it “Intel® Core™ Processors (Series 1)3” is that harmful??

    Reply

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.