{ "schema_version": "1.4.0", "id": "GHSA-x7rq-j53w-9x9x", "modified": "2025-04-11T04:17:25Z", "published": "2022-05-17T04:55:58Z", "aliases": [ "CVE-2013-6795" ], "details": "The Updater in Rackspace Openstack Windows Guest Agent for XenServer before 1.2.6.0 allows remote attackers to execute arbitrary code via a crafted serialized .NET object to TCP port 1984, which triggers the download and extraction of a ZIP file that overwrites the Agent service binary.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6795" }, { "type": "WEB", "url": "https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/commit/ef16f88f20254b8083e361f11707da25f8482401" }, { "type": "WEB", "url": "https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/releases/tag/1.2.6.0" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-11/0122.html" }, { "type": "WEB", "url": "http://blog.cloudpassage.com/2013/11/18/cve-2013-6795-vulnerability-rackspace-windows-agent-updater" }, { "type": "WEB", "url": "http://osvdb.org/100191" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/124153/Rackspace-Windows-Agent-Updater-Arbitrary-Code-Execution.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/55775" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-12-24T18:55:00Z" } }