The Updater in Rackspace Openstack Windows Guest Agent for XenServer before 1.2.6.0 allows remote attackers to execute arbitrary code via a crafted serialized .NET object to TCP port 1984, which triggers the download and extraction of a ZIP file that overwrites the Agent service binary.
References
Configurations
Information
Published : 2013-12-24 10:55
Updated : 2013-12-26 07:14
NVD link : CVE-2013-6795
Mitre link : CVE-2013-6795
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
rackspace
- openstack_windows_guest_agent