Unbounded Memory Usage and DoS Vulnerability in Xen's Ocaml Xenstored Implementation

Unbounded Memory Usage and DoS Vulnerability in Xen's Ocaml Xenstored Implementation

CVE-2020-29485 · MEDIUM Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_RESET_WATCHES request, not all tracking information is freed. A guest can cause unbounded memory usage in oxenstored. This can lead to a system-wide DoS. Only systems using the Ocaml Xenstored implementation are vulnerable. Systems using the C Xenstored implementation are not vulnerable.

Learn more about our Web Application Penetration Testing UK.