HPE LoadRunner Shared Memory Name Construction RCE

High Nessus Plugin ID 91972


A software performance testing application running on the remote host is affected by a remote code execution vulnerability.


The Hewlett Packard Enterprise (HPE) LoadRunner application running on the remote host is affected by a stack-based buffer overflow condition in mchan.dll, when constructing a shared memory file name, due to improper validation of the size of a user-supplied string. An unauthenticated, remote attacker can exploit this, via a long '-server_name' value, to execute arbitrary code with the privileges of the user running the application.

Note that LoadRunner reportedly is affected by other vulnerabilities, which can result in a denial of service; however, Nessus has not tested for these.


Apply the appropriate patch or upgrade according to the vendor advisory.

See Also


Plugin Details

Severity: High

ID: 91972

File Name: hp_loadrunner_cve-2016-4359.nasl

Version: 1.10

Type: remote

Published: 2016/07/07

Updated: 2019/11/19

Dependencies: 24326, 11936

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2016-4359

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:hp:loadrunner

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/05/31

Vulnerability Publication Date: 2016/06/01

Reference Information

CVE: CVE-2016-4359

ZDI: ZDI-16-363

HP: HPSBGN03609, PSRT110020, emr_na-c05157423

TRA: TRA-2016-16