Lucene search

K
xenXen ProjectXSA-419
HistoryNov 01, 2022 - 10:57 a.m.

Xenstore: Cooperating guests can create arbitrary numbers of nodes

2022-11-0110:57:00
Xen Project
xenbits.xen.org
56
xenstore
coopreating guests
arbitrary nodes
denial of service
vulnerable systems
xen
dos

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

17.1%

ISSUE DESCRIPTION

Since the fix of XSA-322 any Xenstore node owned by a removed domain will be modified to be owned by Dom0. This will allow two malicious guests working together to create an arbitrary number of Xenstore nodes.
This is possible by domain A letting domain B write into domain A’s local Xenstore tree. Domain B can then create many nodes and reboot. The nodes created by domain B will now be owned by Dom0. By repeating this process over and over again an arbitrary number of nodes can be created, as Dom0’s number of nodes isn’t limited by Xenstore quota.

IMPACT

Two malicious guests working together can drive xenstored into an out of memory situation, resulting in a Denial of Service (DoS) of xenstored.
This inhibits creation of new guests and changing the configuration of already running guests.

VULNERABLE SYSTEMS

All versions of Xen with the fix for XSA-322 are in principle vulnerable.
Both Xenstore implementations (C and Ocaml) are vulnerable.

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

17.1%