HPE LoadRunner Shared Memory Name Construction RCE

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.

Synopsis :

A software performance testing application running on the remote host
is affected by a remote code execution vulnerability.

Description :

The Hewlett Packard Enterprise (HPE) LoadRunner application running
on the remote host is affected by a stack-based buffer overflow
condition in mchan.dll, when constructing a shared memory file name,
due to improper validation of the size of a user-supplied string. An
unauthenticated, remote attacker can exploit this, via a long
'-server_name' value, to execute arbitrary code with the privileges of
the user running the application.

Note that LoadRunner reportedly is affected by other vulnerabilities,
which can result in a denial of service; however, Nessus has not
tested for these.

See also :


Solution :

Apply the appropriate patch or upgrade according to the vendor

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false

Family: Gain a shell remotely

Nessus Plugin ID: 91972 ()

Bugtraq ID:

CVE ID: CVE-2016-4359

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now