HPE LoadRunner Shared Memory Name Construction RCE

critical Nessus Plugin ID 91972


A software performance testing application running on the remote host is affected by a remote code execution vulnerability.


The Hewlett Packard Enterprise (HPE) LoadRunner application running on the remote host is affected by a stack-based buffer overflow condition in mchan.dll, when constructing a shared memory file name, due to improper validation of the size of a user-supplied string. An unauthenticated, remote attacker can exploit this, via a long '-server_name' value, to execute arbitrary code with the privileges of the user running the application.

Note that LoadRunner reportedly is affected by other vulnerabilities, which can result in a denial of service; however, Nessus has not tested for these.


Apply the appropriate patch or upgrade according to the vendor advisory.

See Also


Plugin Details

Severity: Critical

ID: 91972

File Name: hp_loadrunner_cve-2016-4359.nasl

Version: 1.11

Type: remote

Published: 7/7/2016

Updated: 4/11/2022

Configuration: Enable thorough checks

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2016-4359


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:hp:loadrunner

Exploit Ease: No known exploits are available

Patch Publication Date: 5/31/2016

Vulnerability Publication Date: 6/1/2016

Reference Information

CVE: CVE-2016-4359

HP: emr_na-c05157423, HPSBGN03609, PSRT110020

TRA: TRA-2016-16

ZDI: ZDI-16-363