HP LoadRunner 11.52 Buffer Overflow RCE (uncredentialed check)

critical Nessus Plugin ID 83993

Synopsis

The remote host has a software performance testing application running that is affected by a remote code execution vulnerability.

Description

The version of HP LoadRunner running on the remote host is 11.52, and the file 'two_way_comm.dll' is not patched. It is, therefore, affected by a remote code execution vulnerability due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this to cause a buffer overflow, resulting in a denial of service condition or the execution of arbitrary code.

Solution

Apply the patch referenced in the vendor advisory.

See Also

http://www.nessus.org/u?3d9b6fca

Plugin Details

Severity: Critical

ID: 83993

File Name: hp_loadrunner_HPSBGN03286_rce.nbin

Version: 1.29

Type: remote

Published: 6/4/2015

Updated: 3/19/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:hp:loadrunner

Exploit Ease: No known exploits are available

Patch Publication Date: 5/19/2015

Vulnerability Publication Date: 5/19/2015

Reference Information

CVE: CVE-2015-2110

BID: 74737

HP: HPSBGN03286, SSRT101319, emr_na-c04594015