HP LoadRunner < 11.52 SSL Connection Handling Stack Buffer Overflow RCE

High Nessus Plugin ID 69424


The remote host has a software performance testing application running that is affected by a remote code execution vulnerability.


The version of HP LoadRunner running on the remote host is affected by a remote code execution vulnerability due to a failure to validate the length of data before copying it into a fixed-size buffer when handling connections using SSL. A remote, unauthenticated attacker can exploit this, via a specially crafted request, to cause a stack-based buffer overflow, resulting in the execution of arbitrary code with SYSTEM privileges.


Upgrade to HP LoadRunner 11.52 or later.

See Also




Plugin Details

Severity: High

ID: 69424

File Name: hp_loadrunner_cve-2013-4800.nbin

Version: 1.8

Type: remote

Published: 2013/08/15

Updated: 2020/06/12

Dependencies: 24326

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:hp:loadrunner, cpe:/a:hp:mercury_loadrunner_agent

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/07/24

Vulnerability Publication Date: 2013/07/24

Exploitable With

Metasploit (HP LoadRunner magentproc.exe Overflow)

ExploitHub (EH-13-896)

Reference Information

CVE: CVE-2013-4800

BID: 61446

TRA: TRA-2013-05

HP: HPSBGN02905, SSRT101117, emr_na-c03862772

EDB-ID: 28809