Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-29487

EPSS 0.37% · P59
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-29487

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Xen XAPI before 2020-12-15. Certain xenstore keys provide feedback from the guest, and are therefore watched by toolstack. Specifically, keys are watched by xenopsd, and data are forwarded via RPC through message-switch to xapi. The watching logic in xenopsd sends one RPC update containing all data, any time any single xenstore key is updated, and therefore has O(N^2) time complexity. Furthermore, message-switch retains recent (currently 128) RPC messages for diagnostic purposes, yielding O(M*N) space complexity. The quantity of memory a single guest can monopolise is bounded by xenstored quota, but the quota is fairly large. It is believed to be in excess of 1G per malicious guest. In practice, this manifests as a host denial of service, either through message-switch thrashing against swap, or OOMing entirely, depending on dom0's configuration. (There are no quotas in xenopsd to limit the quantity of keys that result in RPC traffic.) A buggy or malicious guest can cause unreasonable memory usage in dom0, resulting in a host denial of service. All versions of XAPI are vulnerable. Systems that are not using the XAPI toolstack are not vulnerable.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Xen 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Xen是英国剑桥(Cambridge)大学的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。 Xen XAPI before 2020-12-15 存在安全漏洞,该漏洞源于某些xenstore键提供来自来宾操作系统的反馈,因此可以被toolstack监视。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-29487

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-29487

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-12-15 · 116 CVEs total

CVE-2020-284427.5 HIGHPrototype Pollution
CVE-2020-284567.3 HIGHCross-site Scripting (XSS)
CVE-2020-284577.2 HIGHCross-site Scripting (XSS)
CVE-2020-27055Google Android 安全漏洞
CVE-2020-29480Xen 授权问题漏洞
CVE-2020-29479Xen 权限许可和访问控制问题漏洞
CVE-2020-29571Xen 代码问题漏洞
CVE-2020-29570Xen 安全漏洞
CVE-2020-29569Linux kernel 资源管理错误漏洞
CVE-2020-27777Linux kernel 授权问题漏洞
CVE-2020-25712xorg-x11-server 缓冲区错误漏洞
CVE-2020-29568Xen 缓冲区错误漏洞
CVE-2020-29567Xen 安全漏洞
CVE-2020-29566Xen 处理逻辑错误漏洞
CVE-2020-27068Google Android 缓冲区错误漏洞
CVE-2020-27067Google Android 资源管理错误漏洞
CVE-2020-27066Google Android 资源管理错误漏洞
CVE-2020-27048Google Android 缓冲区错误漏洞
CVE-2020-27047Google Android 缓冲区错误漏洞
CVE-2020-27046Google Android 缓冲区错误漏洞

Showing top 20 of 116 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-29487

No comments yet


Leave a comment