Unrated severityNVD Advisory· Published Dec 24, 2013· Updated Apr 29, 2026
CVE-2013-6795
CVE-2013-6795
Description
The Updater in Rackspace Openstack Windows Guest Agent for XenServer before 1.2.6.0 allows remote attackers to execute arbitrary code via a crafted serialized .NET object to TCP port 1984, which triggers the download and extraction of a ZIP file that overwrites the Agent service binary.
Affected products
1- cpe:2.3:a:rackspace:openstack_windows_guest_agent:*:-:-:*:-:xen_server:*:*Range: <=1.2.5.0
Patches
1ef16f88f2025Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- github.com/rackerlabs/openstack-guest-agents-windows-xenserver/commit/ef16f88f20254b8083e361f11707da25f8482401nvdExploitPatch
- blog.cloudpassage.com/2013/11/18/cve-2013-6795-vulnerability-rackspace-windows-agent-updater/nvdURL Repurposed
- archives.neohapsis.com/archives/bugtraq/2013-11/0122.htmlnvd
- osvdb.org/100191nvd
- packetstormsecurity.com/files/124153/Rackspace-Windows-Agent-Updater-Arbitrary-Code-Execution.htmlnvd
- secunia.com/advisories/55775nvd
- github.com/rackerlabs/openstack-guest-agents-windows-xenserver/releases/tag/1.2.6.0nvd
News mentions
0No linked articles in our index yet.