Escaping containers using the Dirty Pipe vulnerability | Datadog Security Labs
Tags
attack-pattern: | Data Exploits - T1587.004 Exploits - T1588.005 Malicious Image - T1204.003 Server - T1583.004 Server - T1584.004 Vulnerabilities - T1588.006 Sudo - T1169 |
Common Information
Type | Value |
---|---|
UUID | edb282b0-abf5-4125-8bc4-ec4c95c8be3b |
Fingerprint | 8d0119b419353fa1 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | March 25, 2022, midnight |
Added to db | Aug. 13, 2023, 9:49 a.m. |
Last updated | Nov. 17, 2024, 5:54 p.m. |
Headline | Escaping containers using the Dirty Pipe vulnerability |
Title | Escaping containers using the Dirty Pipe vulnerability | Datadog Security Labs |
Detected Hints/Tags/Attributes | 50/1/10 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 230 | ✔ | Datadog Security Labs | https://securitylabs.datadoghq.com/rss/feed.xml | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 23 | cve-2019-5736 |
|
Details | Domain | 12 | ghcr.io |
|
Details | Domain | 1 | wait-for-runc-and-overwrite.sh |
|
Details | Domain | 224 | unit42.paloaltonetworks.com |
|
Details | Domain | 9 | dirtypipe.cm4all.com |
|
Details | Domain | 5 | haxx.in |
|
Details | md5 | 1 | 4139ffa81a373778877c5987ac476a19 |
|
Details | md5 | 1 | 721e312c0f3208913eaa6f3762b2d0cb |
|
Details | Url | 1 | https://unit42.paloaltonetworks.com/breaking-docker-via-runc-explaining-cve-2019-5736 |
|
Details | Url | 2 | https://haxx.in/files/dirtypipez.c |