HPE LoadRunner < 12.53 Patch 4 libxdrutil.dll mxdr_string() RCE

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

An application installed on the remote Windows host is affected by a
remote code execution vulnerability.

Description :

The version of HP LoadRunner installed on the remote Windows host is
prior to 12.53 patch 4. It is, therefore, affected by a remote code
execution vulnerability due to a heap-based buffer overflow condition
in the mxdr_string() function in libxdrutil.dll. An unauthenticated,
remote attacker can exploit this to execute arbitrary code.

See also :

http://www.nessus.org/u?1935cc18
https://www.tenable.com/security/research/tra-2017-13
http://www.zerodayinitiative.com/advisories/ZDI-17-160/

Solution :

Upgrade to HP LoadRunner version 12.53 patch 4 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 97888 ()

Bugtraq ID: 96774

CVE ID: CVE-2017-5789

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now