"value":"All Xen versions are vulnerable.\n\nBoth Xenstore implementations (C and Ocaml) are vulnerable."
}
]
}
}
},
"credit":{
"credit_data":{
"description":{
"description_data":[
{
"lang":"eng",
"value":"This issue was discovered by Julien Grall of Amazon."
}
]
}
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
{
"lang":"eng",
"value":"Xenstore: guests can let run xenstored out of memory\n\nT[his CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nMalicious guests can cause xenstored to allocate vast amounts of memory,\neventually resulting in a Denial of Service (DoS) of xenstored.\n\nThere are multiple ways how guests can cause large memory allocations\nin xenstored:\n\n- - by issuing new requests to xenstored without reading the responses,\n causing the responses to be buffered in memory\n\n- - by causing large number of watch events to be generated via setting up\n multiple xenstore watches and then e.g. deleting many xenstore nodes\n below the watched path\n\n- - by creating as many nodes as allowed with the maximum allowed size and\n path length in as many transactions as possible\n\n- - by accessing many nodes inside a transaction"
}
]
},
"impact":{
"impact_data":{
"description":{
"description_data":[
{
"lang":"eng",
"value":"Unprivileged guests can cause a DoS of xenstored, resulting in the\ninability to create new guests or modify the configuration of running\nguests."