HP LoadRunner < 11.52 SSL Connection Handling Stack Buffer Overflow RCE

High Nessus Plugin ID 69424

Synopsis

The remote host has a software performance testing application running that is affected by a remote code execution vulnerability.

Description

The version of HP LoadRunner running on the remote host is affected by a remote code execution vulnerability due to a failure to validate the length of data before copying it into a fixed-size buffer when handling connections using SSL. A remote, unauthenticated attacker can exploit this, via a specially crafted request, to cause a stack-based buffer overflow, resulting in the execution of arbitrary code with SYSTEM privileges.

Solution

Upgrade to HP LoadRunner 11.52 or later.

See Also

https://www.tenable.com/security/research/tra-2013-05

http://www.nessus.org/u?5db0b95f

http://www.zerodayinitiative.com/advisories/ZDI-13-169/

Plugin Details

Severity: High

ID: 69424

File Name: hp_loadrunner_cve-2013-4800.nbin

Version: Revision: 1.8

Type: remote

Published: 2013/08/15

Modified: 2018/07/26

Dependencies: 24326

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:hp:loadrunner, cpe:/a:hp:mercury_loadrunner_agent

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/07/24

Vulnerability Publication Date: 2013/07/24

Exploitable With

Metasploit (HP LoadRunner magentproc.exe Overflow)

ExploitHub (EH-13-896)

Reference Information

CVE: CVE-2013-4800

BID: 61446

TRA: TRA-2013-05

HP: HPSBGN02905, SSRT101117, emr_na-c03862772

EDB-ID: 28809