The Updater in Rackspace Openstack Windows Guest Agent for XenServer before 1.2.6.0 allows remote attackers to execute arbitrary code via a crafted serialized .NET object to TCP port 1984, which triggers the download and extraction of a ZIP file that overwrites the Agent service binary.
References
Configurations
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2013-11/0122.html - | |
References | () http://blog.cloudpassage.com/2013/11/18/cve-2013-6795-vulnerability-rackspace-windows-agent-updater/ - URL Repurposed | |
References | () http://osvdb.org/100191 - | |
References | () http://packetstormsecurity.com/files/124153/Rackspace-Windows-Agent-Updater-Arbitrary-Code-Execution.html - | |
References | () http://secunia.com/advisories/55775 - | |
References | () https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/commit/ef16f88f20254b8083e361f11707da25f8482401 - Exploit, Patch | |
References | () https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/releases/tag/1.2.6.0 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://blog.cloudpassage.com/2013/11/18/cve-2013-6795-vulnerability-rackspace-windows-agent-updater/ - URL Repurposed |
Information
Published : 2013-12-24 18:55
Updated : 2024-11-21 01:59
NVD link : CVE-2013-6795
Mitre link : CVE-2013-6795
CVE.ORG link : CVE-2013-6795
JSON object : View
Products Affected
rackspace
- openstack_windows_guest_agent
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')