CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2019-5736
8.655.56%

Breaking Out of the Box: The Runc Overwrite (CVE-2019-5736)

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 1, 2026·6 min read·18 visits

Weaponized

Executive Summary (TL;DR)

Containers aren't real. They are just processes lying to the kernel. CVE-2019-5736 exploits this lie by tricking the host's container runtime (`runc`) into exposing its own binary file descriptor to the container it is managing. An attacker can overwrite the `runc` binary on the host with a malicious payload, achieving root execution on the host system the next time `runc` is used.

A fundamental design flaw in how `runc` handles file descriptors allows a malicious container to overwrite the host `runc` binary, resulting in complete host compromise upon subsequent execution.

Official Patches

DockerDocker Engine 18.09.2 Release Notes
OpenContainersOfficial fix commit in runc

Fix Analysis (1)

Technical Appendix

CVSS Score
8.6/ 10
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Probability
55.56%
Top 99% most exploited

Affected Systems

Docker (versions prior to 18.09.2)Kubernetes (nodes using affected container runtimes)containerd (prior to patched versions)CRI-O (prior to patched versions)runc (<= 1.0-rc6)

Affected Versions Detail

Product
Affected Versions
Fixed Version
runc
OpenContainers
<= 1.0-rc61.0-rc7
Docker
Docker Inc.
< 18.09.218.09.2
AttributeDetail
CWE IDCWE-269
Attack VectorLocal (requires container execution)
CVSS8.6 (High)
EPSS Score55.56%
ImpactContainer Escape / Host Root Compromise
Exploit StatusWeaponized / PoC Available

MITRE ATT&CK Mapping

T1611Escape to Host
Privilege Escalation
T1543Create or Modify System Process
Persistence
T1574Hijack Execution Flow
Persistence
CWE-269
Improper Privilege Management

Improper Privilege Management

Known Exploits & Detection

GitHubGo-based implementation of the container escape
ExploitDBPoC for runc container escape

Vulnerability Timeline

Vulnerability discovered by Adam Iwaniuk and Borys Popławski
2019-01-01
CVE-2019-5736 Assigned and Patch Released
2019-02-11
Public Proof of Concepts released
2019-02-13

References & Sources

  • [1]Unit42 Analysis of CVE-2019-5736
  • [2]Dragonfly Research: Runc Escape
Related Vulnerabilities
CVE-2024-21626CVE-2016-9962

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.