HPE LoadRunner Shared Memory Name Construction RCE

High Nessus Plugin ID 91972

Synopsis

A software performance testing application running on the remote host is affected by a remote code execution vulnerability.

Description

The Hewlett Packard Enterprise (HPE) LoadRunner application running on the remote host is affected by a stack-based buffer overflow condition in mchan.dll, when constructing a shared memory file name, due to improper validation of the size of a user-supplied string. An unauthenticated, remote attacker can exploit this, via a long '-server_name' value, to execute arbitrary code with the privileges of the user running the application.

Note that LoadRunner reportedly is affected by other vulnerabilities, which can result in a denial of service; however, Nessus has not tested for these.

Solution

Apply the appropriate patch or upgrade according to the vendor advisory.

See Also

http://www.nessus.org/u?a216ffbd

Plugin Details

Severity: High

ID: 91972

File Name: hp_loadrunner_cve-2016-4359.nasl

Version: 1.6

Type: remote

Published: 2016/07/07

Modified: 2018/07/12

Dependencies: 24326, 11936

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:hp:loadrunner

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/05/31

Vulnerability Publication Date: 2016/06/01

Reference Information

CVE: CVE-2016-4359

ZDI: ZDI-16-363

HP: HPSBGN03609, PSRT110020, emr_na-c05157423

TRA: TRA-2016-16