Dastardly Docker Desktop Defect Detected

Source: Bleeping Computer Dastardly Docker Desktop Defect Detected

Get Owned With Just Three Lines Of Python

If you use Docker Desktop, on either Windows or Mac, you are at risk unless you drop everything and update to version 4.44.3.  The exploit, a mere 9.3, can evade Docker’s Enhanced Container Isolation and allow an attacker to launch additional Docker containers without needing to mount a socket. The proof of concept “binds the Windows host’s C: drive to the container’s filesystem by using two wget HTTP POST requests“.  That gives them access to your whole system and with little effort they could give themselves admin on your Windows system.  It is obnoxiously easy to pull off and can be rather hard to detect.

Mac users shouldn’t feel too smug, while there is still a layer of isolation protecting the system from this Docker exploit giving an attacker the ability to mount user directories without a prompt.  However, the attacker will still gain complete control over your Docker install and your containers so there is plenty of opportunities for mischief. 

Make sure to update as quickly as you can!  

A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active.

Video News

About The Author

Jeremy Hellstrom

Call it K7M.com, AMDMB.com, or PC Perspective, Jeremy has been hanging out and then working with the gang here for years. Apart from the front page you might find him on the BOINC Forums or possibly the Fraggin' Frogs if he has the time.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Podcasts

Archive & Timeline

Previous 12 months
Explore: All The Years!