HP LoadRunner 11.52 / 12.00 / 12.01 / 12.02 / 12.50 Multiple Vulnerabilities

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

An application installed on the remote Windows host is affected by
multiple vulnerabilities.

Description :

The version of HP LoadRunner installed on the remote Windows host is
11.52, 12.00, 12.01, 12.02, or 12.50, without the HPSBGN03609 hotfix.
It is, therefore, affected by multiple vulnerabilities :

- An overflow condition exists in mchan.dll due to a
failure to validate the size of a user-supplied string
prior to copying it to a stack-based buffer. An
unauthenticated, remote attacker can exploit this to
cause a stack-based buffer overflow, resulting in the
execution of arbitrary code. (CVE-2016-4359)

- A flaw exists in the CSV import feature when handling
file paths. An unauthenticated, remote attacker can
exploit this to delete arbitrary files on the remote
system. (CVE-2016-4360)

- A flaw exists in the magentservice.exe service that is
triggered when handling malformed xdr_string fields in a
series of service connection requests. An
unauthenticated, remote attacker can exploit this, via a
specially crafted request, to crash the service,
resulting in a denial of service condition.

See also :


Solution :

Upgrade to HP LoadRunner version 12.53 or later. Alternatively, apply
the HPSBGN03609 hotfix.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 91571 ()

Bugtraq ID: 90975

CVE ID: CVE-2016-4359

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now