HPE LoadRunner Shared Memory Name Construction RCE

High Nessus Plugin ID 91972


A software performance testing application running on the remote host is affected by a remote code execution vulnerability.


The Hewlett Packard Enterprise (HPE) LoadRunner application running on the remote host is affected by a stack-based buffer overflow condition in mchan.dll, when constructing a shared memory file name, due to improper validation of the size of a user-supplied string. An unauthenticated, remote attacker can exploit this, via a long '-server_name' value, to execute arbitrary code with the privileges of the user running the application.

Note that LoadRunner reportedly is affected by other vulnerabilities, which can result in a denial of service; however, Nessus has not tested for these.


Apply the appropriate patch or upgrade according to the vendor advisory.

See Also


Plugin Details

Severity: High

ID: 91972

File Name: hp_loadrunner_cve-2016-4359.nasl

Version: $Revision: 1.5 $

Type: remote

Published: 2016/07/07

Modified: 2017/03/21

Dependencies: 11936, 24326

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:hp:loadrunner

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/05/31

Vulnerability Publication Date: 2016/06/01

Reference Information

CVE: CVE-2016-4359

OSVDB: 139287

ZDI: ZDI-16-363

HP: HPSBGN03609, PSRT110020, emr_na-c05157423

TRA: TRA-2016-16