HPE LoadRunner < 12.50 mchan.dll Packet Handling Invalid Memory Access DoS

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

An application installed on the remote Windows host is affected by a
denial of service vulnerability.

Description :

The version of HP LoadRunner installed on the remote Windows host is
prior to 12.50 patch 3. It is, therefore, affected by a denial of
service vulnerability in the mchan.dll library due to improper
parsing of malformed packets. An unauthenticated, remote attacker can
exploit this, via a specially crafted request, to crash the service.

See also :

http://www.nessus.org/u?491a66db
https://www.tenable.com/security/research/tra-2016-26

Solution :

Upgrade to HP LoadRunner version 12.50 patch 3 or later.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 97552 ()

Bugtraq ID: 93069

CVE ID: CVE-2016-4384

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now