HIGH · 9.3

CVE-2013-6795

The Updater in Rackspace Openstack Windows Guest Agent for XenServer before 1.2.6.0 allows remote attackers to execute arbitrary code via a crafted serialized .NET object to TCP port 1984, which trigg...

Vulnerability Description

The Updater in Rackspace Openstack Windows Guest Agent for XenServer before 1.2.6.0 allows remote attackers to execute arbitrary code via a crafted serialized .NET object to TCP port 1984, which triggers the download and extraction of a ZIP file that overwrites the Agent service binary.

CVSS Score

9.3

HIGH

AV:N/AC:M/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
RackspaceOpenstack Windows Guest Agent<= 1.2.5.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-6795?

CVE-2013-6795 is a vulnerability with a CVSS score of 9.3 (HIGH). The Updater in Rackspace Openstack Windows Guest Agent for XenServer before 1.2.6.0 allows remote attackers to execute arbitrary code via a crafted serialized .NET object to TCP port 1984, which trigg...

How severe is CVE-2013-6795?

CVE-2013-6795 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-6795?

Check the references section above for vendor advisories and patch information. Affected products include: Rackspace Openstack Windows Guest Agent.