Bugzilla – Bug 856834
VUL-0: CVE-2013-6795: openstack: Rackspace Openstack Windows Guest Agent file overwrite
Last modified: 2014-01-08 14:09:23 UTC
CVE-2013-6795 The Updater in Rackspace Openstack Windows Guest Agent for XenServer before 1.2.6.0 allows remote attackers to execute arbitrary code via a crafted serialized .NET object to TCP port 1984, which triggers the download and extraction of a ZIP file that overwrites the Agent service binary. References: http://www.cvedetails.com/cve/CVE-2013-6795/ http://archives.neohapsis.com/archives/bugtraq/2013-11/0122.html http://blog.cloudpassage.com/2013/11/18/cve-2013-6795-vulnerability-rackspace-windows-agent-updater/ http://osvdb.org/100191 http://packetstormsecurity.com/files/124153/Rackspace-Windows-Agent-Updater-Arbitrary-Code-Execution.html http://secunia.com/advisories/55775 https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/commit/ef16f88f20254b8083e361f11707da25f8482401 https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/releases/tag/1.2.6.0 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6795 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6795
vincent, its not clear to me if we ship it ... we did ship some .exe files with openstack as I vaguely remember. please comment.
bugbot adjusting priority
We do not ship this. That's something from Rackspace (we don't ship anything from them) and for XenServer (we do not support that).