SynopsisAn application installed on the remote Windows host is affected by multiple vulnerabilities.
DescriptionThe version of HP LoadRunner installed on the remote Windows host is 11.52, 12.00, 12.01, 12.02, or 12.50, without the HPSBGN03609 hotfix.
It is, therefore, affected by multiple vulnerabilities :
- An overflow condition exists in mchan.dll due to a failure to validate the size of a user-supplied string prior to copying it to a stack-based buffer. An unauthenticated, remote attacker can exploit this to cause a stack-based buffer overflow, resulting in the execution of arbitrary code. (CVE-2016-4359)
- A flaw exists in the CSV import feature when handling file paths. An unauthenticated, remote attacker can exploit this to delete arbitrary files on the remote system. (CVE-2016-4360)
- A flaw exists in the magentservice.exe service that is triggered when handling malformed xdr_string fields in a series of service connection requests. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to crash the service, resulting in a denial of service condition.
SolutionUpgrade to HP LoadRunner version 12.53 or later. Alternatively, apply the HPSBGN03609 hotfix.