// For flags

CVE-2020-29482

 

Severity Score

6.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Xen through 4.14.x. A guest may access xenstore paths via absolute paths containing a full pathname, or via a relative path, which implicitly includes /local/domain/$DOMID for their own domain id. Management tools must access paths in guests' namespaces, necessarily using absolute paths. oxenstored imposes a pathname limit that is applied solely to the relative or absolute path specified by the client. Therefore, a guest can create paths in its own namespace which are too long for management tools to access. Depending on the toolstack in use, a malicious guest administrator might cause some management tools and debugging operations to fail. For example, a guest administrator can cause "xenstore-ls -r" to fail. However, a guest administrator cannot prevent the host administrator from tearing down the domain. All systems using oxenstored are vulnerable. Building and using oxenstored is the default in the upstream Xen distribution, if the Ocaml compiler is available. Systems using C xenstored are not vulnerable.

Se detectó un problema en Xen versiones hasta 4.14.x. Un invitado puede acceder a las rutas de xenstore por medio de rutas absolutas que contienen un nombre de ruta completo, o por medio de una ruta relativa, que implícitamente incluye /local/ domain/$DOMID para su propio ID de dominio. Las herramientas de administración deben acceder a las rutas en los espacios de nombres de los invitados, necesariamente usando rutas absolutas. oxenstored impone un límite de nombre de ruta que es aplicado únicamente a la ruta relativa o absoluta especificada por el cliente. Por lo tanto, un invitado puede crear rutas en su propio espacio de nombre que son demasiado largas para que las herramientas de administración accedan. Dependiendo de la toolstack en uso, un administrador invitado malicioso puede causar que algunas herramientas de administración y operaciones de depuración presenten un fallo. Por ejemplo, un administrador invitado puede causar que "xenstore-ls -r" presente un fallo. Sin embargo, un administrador invitado no puede impedir que el administrador del host elimine el dominio. Todos los sistemas utilizados en oxenstored son vulnerables. La construcción y el uso de oxenstored es el valor predeterminado en la distribución Xen previa, si el compilador Ocaml está disponible. Los sistemas que usan C xenstored no son vulnerables

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-03 CVE Reserved
  • 2020-12-15 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-426: Untrusted Search Path
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xen
Search vendor "Xen"
Xen
Search vendor "Xen" for product "Xen"
<= 4.14.0
Search vendor "Xen" for product "Xen" and version " <= 4.14.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
32
Search vendor "Fedoraproject" for product "Fedora" and version "32"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
33
Search vendor "Fedoraproject" for product "Fedora" and version "33"
-
Affected