HPE LoadRunner Shared Memory Name Construction RCE

critical Nessus Plugin ID 91972
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


A software performance testing application running on the remote host is affected by a remote code execution vulnerability.


The Hewlett Packard Enterprise (HPE) LoadRunner application running on the remote host is affected by a stack-based buffer overflow condition in mchan.dll, when constructing a shared memory file name, due to improper validation of the size of a user-supplied string. An unauthenticated, remote attacker can exploit this, via a long '-server_name' value, to execute arbitrary code with the privileges of the user running the application.

Note that LoadRunner reportedly is affected by other vulnerabilities, which can result in a denial of service; however, Nessus has not tested for these.


Apply the appropriate patch or upgrade according to the vendor advisory.

See Also


Plugin Details

Severity: Critical

ID: 91972

File Name: hp_loadrunner_cve-2016-4359.nasl

Version: 1.10

Type: remote

Published: 7/7/2016

Updated: 11/19/2019

Dependencies: loadrunner_agent_detect.nasl, os_fingerprint.nasl

Risk Information

CVSS Score Source: CVE-2016-4359


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:hp:loadrunner

Exploit Ease: No known exploits are available

Patch Publication Date: 5/31/2016

Vulnerability Publication Date: 6/1/2016

Reference Information

CVE: CVE-2016-4359

ZDI: ZDI-16-363

HP: HPSBGN03609, PSRT110020, emr_na-c05157423

TRA: TRA-2016-16