cvelist/2022/42xxx/CVE-2022-42318.json

109 lines
3.5 KiB
JSON
Raw Normal View History

2022-10-03 17:00:31 +00:00
{
"CVE_data_meta" : {
"ASSIGNER" : "security@xenproject.org",
"ID" : "CVE-2022-42318"
},
"affects" : {
"vendor" : {
"vendor_data" : [
2022-10-03 17:00:31 +00:00
{
"product" : {
"product_data" : [
{
"product_name" : "xen",
"version" : {
"version_data" : [
{
"version_affected" : "?",
"version_value" : "consult Xen advisory XSA-326"
}
]
}
}
]
},
"vendor_name" : "Xen"
2022-10-03 17:00:31 +00:00
}
]
}
},
"configuration" : {
"configuration_data" : {
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "All Xen versions are vulnerable.\n\nBoth Xenstore implementations (C and Ocaml) are vulnerable."
}
]
}
}
},
"credit" : {
"credit_data" : {
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "This issue was discovered by Julien Grall of Amazon."
}
]
}
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Xenstore: guests can let run xenstored out of memory\n\nT[his CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nMalicious guests can cause xenstored to allocate vast amounts of memory,\neventually resulting in a Denial of Service (DoS) of xenstored.\n\nThere are multiple ways how guests can cause large memory allocations\nin xenstored:\n\n- - by issuing new requests to xenstored without reading the responses,\n causing the responses to be buffered in memory\n\n- - by causing large number of watch events to be generated via setting up\n multiple xenstore watches and then e.g. deleting many xenstore nodes\n below the watched path\n\n- - by creating as many nodes as allowed with the maximum allowed size and\n path length in as many transactions as possible\n\n- - by accessing many nodes inside a transaction"
}
]
},
"impact" : {
"impact_data" : {
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Unprivileged guests can cause a DoS of xenstored, resulting in the\ninability to create new guests or modify the configuration of running\nguests."
}
]
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "unknown"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://xenbits.xenproject.org/xsa/advisory-326.txt"
}
]
},
"workaround" : {
"workaround_data" : {
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "There is no mitigation available."
}
]
}
}
}
}