HP LoadRunner < 11.00 Patch 4 Code Execution Vulnerability

Critical Nessus Plugin ID 59718


The remote Windows host has a software performance testing application that is affected by a remote code execution vulnerability.


The version of HP LoadRunner installed on the remote Windows host is potentially affected by a code execution vulnerability. The application fails to properly handle incoming packets with '0x00000000' as the first 32-bit value. A remote, unauthenticated attacker, exploiting this flaw, could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.


Upgrade to HP LoadRunner 11.00 Patch 4 or later.

See Also



Plugin Details

Severity: Critical

ID: 59718

File Name: hp_loadrunner_11_patch4_code_exec.nasl

Version: $Revision: 1.3 $

Type: local

Agent: windows

Family: Windows

Published: 2012/06/26

Modified: 2012/09/06

Dependencies: 59717

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:hp:loadrunner

Required KB Items: SMB/HP LoadRunner/Version, SMB/HP LoadRunner/VersionUI, SMB/HP LoadRunner/Path

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/05/29

Vulnerability Publication Date: 2012/01/12

Exploitable With

Core Impact

Metasploit (HP Diagnostics Server magentservice.exe Overflow)

Reference Information

CVE: CVE-2011-4789

BID: 51398

OSVDB: 78309