{
  "threat_severity" : "Important",
  "public_date" : "2016-05-19T00:00:00Z",
  "bugzilla" : {
    "description" : "origin: pod update allows docker socket access via build-pod",
    "id" : "1333461",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1333461"
  },
  "cvss" : {
    "cvss_base_score" : "6.5",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:S/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cwe" : "CWE-284",
  "details" : [ "Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.", "A vulnerability was found in the STI build process in OpenShift Enterprise. Access to STI builds was not properly restricted, allowing an attacker to use STI builds to access the Docker socket and escalate their privileges." ],
  "acknowledgement" : "This issue was discovered by David Eads (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.2",
    "release_date" : "2016-05-19T00:00:00Z",
    "advisory" : "RHSA-2016:1094",
    "cpe" : "cpe:/a:redhat:openshift:3.2::el7",
    "package" : "atomic-openshift-0:3.2.0.44-1.git.0.a4463d9.el7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.2",
    "release_date" : "2016-05-19T00:00:00Z",
    "advisory" : "RHSA-2016:1094",
    "cpe" : "cpe:/a:redhat:openshift:3.2::el7",
    "package" : "nodejs-node-uuid-0:1.4.7-1.el7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-3738\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-3738" ],
  "name" : "CVE-2016-3738",
  "csaw" : false
}