HP LoadRunner lrLRIServices ActiveX Control Code Execution Vulnerability

high Nessus Plugin ID 69399

Synopsis

The remote host has an ActiveX control installed that is affected by an arbitrary code execution vulnerability.

Description

The remote host has the HP LoadRunner lrLRIServices ActiveX control installed. The version of the installed control is potentially affected by an arbitrary code execution vulnerability in the handling of input to the output directory mutator. By tricking a user into opening a specially crafted web page, a remote attacker may be able to execute arbitrary code subject to the privileges of the user running the affected application.

Solution

Upgrade to HP LoadRunner 11.52 or later.

See Also

http://www.nessus.org/u?1a3faf3c

https://www.zerodayinitiative.com/advisories/ZDI-13-209/

Plugin Details

Severity: High

ID: 69399

File Name: hp_loadrunner_lriservices_activex.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 8/16/2013

Updated: 11/27/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2013-4801

Vulnerability Information

CPE: cpe:/a:hp:loadrunner

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 7/24/2013

Vulnerability Publication Date: 7/24/2013

Reference Information

CVE: CVE-2013-4801

BID: 61445