漏洞标题
N/A
漏洞描述信息
"Xenstore:客人可以使xenstored从内存中运行[这是CNA信息记录,与多个CVE相关;文本解释了与哪个CVE相关的哪些方面/漏洞。]恶意客人可能导致xenstored分配大量内存,最终导致xenstored的Denial of Service(DoS)。客人可以在xenstored中进行多次内存分配: - - 通过向xenstored发出未读取回应的新请求,导致回应在内存中缓冲 - - 通过通过设置多个xenstore监控并然后例如删除监控路径下面的许多xenstore节点等方式,在尽可能多的交易中生成大量监控事件 - - 通过在尽可能多的交易内访问许多节点 - - 通过在交易内访问许多节点的方式,访问交易内部许多节点。"]
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Xen 安全漏洞
漏洞描述信息
Xen是英国剑桥(Cambridge)大学的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。 Xen Xenstore存在安全漏洞,该漏洞源于恶意访客可以通过多种方式导致大量内存分配,最终导致拒绝服务(DoS)。
CVSS信息
N/A
漏洞类别
其他