CVE-2019-0204:
Docker image code execution with Apache Mesos
7.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.55982%
CWE
-
Published
5/13/2022
Updated
1/30/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.mesos:mesos | maven | < 1.4.3 | 1.4.3 |
org.apache.mesos:mesos | maven | >= 1.5.0, < 1.5.3 | 1.5.3 |
org.apache.mesos:mesos | maven | >= 1.6.0, < 1.6.2 | 1.6.2 |
org.apache.mesos:mesos | maven | >= 1.7.0, < 1.7.2 | 1.7.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from executing containerizer/executor binaries from writable filesystem paths. The patches introduce memfd cloning to prevent binary replacement. Key vulnerable functions are those that: 1. Constructed command paths using path::join() with launcher_dir 2. Executed binaries via subprocess()/fork() with filesystem paths 3. Initialized container components without memory sealing. The CommandExecutor::launch and MesosContainerizerProcess::_launch functions directly handled binary execution paths prior to memfd protection, making them primary exploitation points.