HPE LoadRunner Shared Memory Name Construction RCE

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

A software performance testing application running on the remote host
is affected by a remote code execution vulnerability.

Description :

The Hewlett Packard Enterprise (HPE) LoadRunner application running
on the remote host is affected by a stack-based buffer overflow
condition in mchan.dll, when constructing a shared memory file name,
due to improper validation of the size of a user-supplied string. An
unauthenticated, remote attacker can exploit this, via a long
'-server_name' value, to execute arbitrary code with the privileges of
the user running the application.

Note that LoadRunner reportedly is affected by other vulnerabilities,
which can result in a denial of service; however, Nessus has not
tested for these.

See also :

http://www.nessus.org/u?a216ffbd

Solution :

Apply the appropriate patch or upgrade according to the vendor
advisory.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Gain a shell remotely

Nessus Plugin ID: 91972 ()

Bugtraq ID:

CVE ID: CVE-2016-4359

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now