"value":"All versions of XAPI are vulnerable.\n\nSystems which are not using the XAPI toolstack are not vulnerable."
}
]
}
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
{
"lang":"eng",
"value":"XAPI open file limit DoS\n\nIt is possible for an unauthenticated client on the network to cause\nXAPI to hit its file-descriptor limit. This causes XAPI to be unable\nto accept new requests for other (trusted) clients, and blocks XAPI\nfrom carrying out any tasks that require the opening of file\ndescriptors."
}
]
},
"impact":{
"impact_data":{
"description":{
"description_data":[
{
"lang":"eng",
"value":"An attacker is capable of blocking connections to the XAPI HTTP\ninterface, and also interrupt ongoing operations, causing a XAPI\ntoolstack Denial of Service. Such DoS would also affect any guests\nthat require toolstack actions."