CVE-2013-6795

The Updater in Rackspace Openstack Windows Guest Agent for XenServer before 1.2.6.0 allows remote attackers to execute arbitrary code via a crafted serialized .NET object to TCP port 1984, which triggers the download and extraction of a ZIP file that overwrites the Agent service binary.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rackspace:openstack_windows_guest_agent:*:-:-:*:-:xen_server:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://blog.cloudpassage.com/2013/11/18/cve-2013-6795-vulnerability-rackspace-windows-agent-updater/ - () http://blog.cloudpassage.com/2013/11/18/cve-2013-6795-vulnerability-rackspace-windows-agent-updater/ - URL Repurposed

Information

Published : 2013-12-24 18:55

Updated : 2024-02-14 01:17


NVD link : CVE-2013-6795

Mitre link : CVE-2013-6795

CVE.ORG link : CVE-2013-6795


JSON object : View

Products Affected

rackspace

  • openstack_windows_guest_agent
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')