Логотип exploitDog
bind:"CVE-2020-29480"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-29480"

Количество 15

Количество 15

ubuntu логотип

CVE-2020-29480

около 5 лет назад

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests...

CVSS3: 2.3
EPSS: Низкий
nvd логотип

CVE-2020-29480

около 5 лет назад

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. T

CVSS3: 2.3
EPSS: Низкий
debian логотип

CVE-2020-29480

около 5 лет назад

An issue was discovered in Xen through 4.14.x. Neither xenstore implem ...

CVSS3: 2.3
EPSS: Низкий
github логотип

GHSA-h88c-j84g-842h

больше 3 лет назад

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests...

EPSS: Низкий
fstec логотип

BDU:2022-06299

около 5 лет назад

Уязвимость гипервизора Xen, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 2.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2331-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2313-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3916-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3915-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3881-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3945-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3914-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3913-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14578-1

около 5 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3880-1

около 5 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-29480

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests...

CVSS3: 2.3
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-29480

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. T

CVSS3: 2.3
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-29480

An issue was discovered in Xen through 4.14.x. Neither xenstore implem ...

CVSS3: 2.3
0%
Низкий
около 5 лет назад
github логотип
GHSA-h88c-j84g-842h

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests...

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-06299

Уязвимость гипервизора Xen, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 2.3
0%
Низкий
около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2331-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2313-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3916-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3915-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3881-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3945-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3914-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3913-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14578-1

Security update for xen

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3880-1

Security update for xen

около 5 лет назад

Уязвимостей на страницу