HP LoadRunner < 11.52 SSL Connection Handling Stack Buffer Overflow RCE

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.


Synopsis :

The remote host has a software performance testing application running
that is affected by a remote code execution vulnerability.

Description :

The version of HP LoadRunner running on the remote host is affected by
a remote code execution vulnerability due to a failure to validate the
length of data before copying it into a fixed-size buffer when
handling connections using SSL. A remote, unauthenticated attacker can
exploit this, via a specially crafted request, to cause a stack-based
buffer overflow, resulting in the execution of arbitrary code with
SYSTEM privileges.

See also :

http://www.nessus.org/u?34e67e67
http://www.zerodayinitiative.com/advisories/ZDI-13-169/

Solution :

Upgrade to HP LoadRunner 11.52 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 69424 ()

Bugtraq ID: 61446

CVE ID: CVE-2013-4800