CVE-2018-15470Uncontrolled Resource Consumption in XEN

Severity
6.5MEDIUMNVD
EPSS
0.2%
top 60.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 17
Latest updateMay 14

Description

An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0

Affected Packages3 packages

debiandebian/xen< xen 4.11.1~pre.20180911.5acdd26fdc+dfsg-2 (bookworm)
Debianxen/xen< 4.11.1~pre.20180911.5acdd26fdc+dfsg-2+3
NVDxen/xen4.11.0

🔴Vulnerability Details

2
GHSA
GHSA-9xrv-h87m-r2vc: An issue was discovered in Xen through 42022-05-14
OSV
CVE-2018-15470: An issue was discovered in Xen through 42018-08-17

📋Vendor Advisories

2
Red Hat
xen: oxenstored does not apply quota-maxentity (XSA-272)2018-08-14
Debian
CVE-2018-15470: xen - An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handl...2018

💬Community

2
Bugzilla
CVE-2018-15470 xen: oxenstored does not apply quota-maxentity (XSA-272) [fedora-all]2018-08-14
Bugzilla
CVE-2018-15470 xen: oxenstored does not apply quota-maxentity (XSA-272)2018-07-31