CVE-2013-6795
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
24/12/2013
Last modified:
11/04/2025
Description
The Updater in Rackspace Openstack Windows Guest Agent for XenServer before 1.2.6.0 allows remote attackers to execute arbitrary code via a crafted serialized .NET object to TCP port 1984, which triggers the download and extraction of a ZIP file that overwrites the Agent service binary.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:rackspace:openstack_windows_guest_agent:*:-:-:*:-:xen_server:*:* | 1.2.5.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2013-11/0122.html
- http://blog.cloudpassage.com/2013/11/18/cve-2013-6795-vulnerability-rackspace-windows-agent-updater/
- http://osvdb.org/100191
- http://packetstormsecurity.com/files/124153/Rackspace-Windows-Agent-Updater-Arbitrary-Code-Execution.html
- http://secunia.com/advisories/55775
- https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/commit/ef16f88f20254b8083e361f11707da25f8482401
- https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/releases/tag/1.2.6.0
- http://archives.neohapsis.com/archives/bugtraq/2013-11/0122.html
- http://blog.cloudpassage.com/2013/11/18/cve-2013-6795-vulnerability-rackspace-windows-agent-updater/
- http://osvdb.org/100191
- http://packetstormsecurity.com/files/124153/Rackspace-Windows-Agent-Updater-Arbitrary-Code-Execution.html
- http://secunia.com/advisories/55775
- https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/commit/ef16f88f20254b8083e361f11707da25f8482401
- https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/releases/tag/1.2.6.0



