HP LoadRunner < 11.52 SSL Connection Handling Stack Buffer Overflow RCE

This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.

Synopsis :

The remote host has a software performance testing application running
that is affected by a remote code execution vulnerability.

Description :

The version of HP LoadRunner running on the remote host is affected by
a remote code execution vulnerability due to a failure to validate the
length of data before copying it into a fixed-size buffer when
handling connections using SSL. A remote, unauthenticated attacker can
exploit this, via a specially crafted request, to cause a stack-based
buffer overflow, resulting in the execution of arbitrary code with
SYSTEM privileges.

See also :


Solution :

Upgrade to HP LoadRunner 11.52 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 69424 ()

Bugtraq ID: 61446

CVE ID: CVE-2013-4800

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now