CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
EPSS
Percentile
27.5%
Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | xen | < 4.16.2+90-g0d39a6d1ae-1 | xen_4.16.2+90-g0d39a6d1ae-1_all.deb |
Debian | 11 | all | xen | < 4.14.5+86-g1c354767d5-1 | xen_4.14.5+86-g1c354767d5-1_all.deb |
Debian | 999 | all | xen | < 4.16.2+90-g0d39a6d1ae-1 | xen_4.16.2+90-g0d39a6d1ae-1_all.deb |
Debian | 13 | all | xen | < 4.16.2+90-g0d39a6d1ae-1 | xen_4.16.2+90-g0d39a6d1ae-1_all.deb |