Docker Machine <=0.16.2 EscSeq Injection & DoS via Crafted Version Data
CVE-2023-40453 Published on November 7, 2023

Docker Machine through 0.16.2 allows an attacker, who has control of a worker node, to provide crafted version data, which might potentially trick an administrator into performing an unsafe action (via escape sequence injection), or might have a data size that causes a denial of service to a bastion node. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

NVD

Weakness Type

What is an Output Sanitization Vulnerability?

The software prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.

CVE-2023-40453 has been classified to as an Output Sanitization vulnerability or weakness.


Products Associated with CVE-2023-40453

Want to know whenever a new CVE is published for Docker Machine? stack.watch will email you.

 

Exploit Probability

EPSS
0.42%
Percentile
61.39%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.