This script is Copyright (C) 2016 Tenable Network Security, Inc.
An application installed on the remote Windows host is affected by
The version of HP LoadRunner installed on the remote Windows host is
11.52, 12.00, 12.01, 12.02, or 12.50, without the HPSBGN03609 hotfix.
It is, therefore, affected by multiple vulnerabilities :
- An overflow condition exists in mchan.dll due to a
failure to validate the size of a user-supplied string
prior to copying it to a stack-based buffer. An
unauthenticated, remote attacker can exploit this to
cause a stack-based buffer overflow, resulting in the
execution of arbitrary code. (CVE-2016-4359)
- A flaw exists in the CSV import feature when handling
file paths. An unauthenticated, remote attacker can
exploit this to delete arbitrary files on the remote
- A flaw exists in the magentservice.exe service that is
triggered when handling malformed xdr_string fields in a
series of service connection requests. An
unauthenticated, remote attacker can exploit this, via a
specially crafted request, to crash the service,
resulting in a denial of service condition.
See also :
Upgrade to HP LoadRunner version 12.53 or later. Alternatively, apply
the HPSBGN03609 hotfix.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false