HP LoadRunner < 12.50 Scenario File Local Code Execution

medium Nessus Plugin ID 85767

Synopsis

The remote Windows host has an application installed that is affected by a local code execution vulnerability.

Description

The version of HP LoadRunner installed on the remote host is prior to 12.50. It is, therefore, affected by a local code execution vulnerability due to an overflow condition that is triggered when handling scenario files (.lrs). A local attacker can exploit this, via a specially crafted scenario file, to cause a stack-based buffer overflow, resulting in the execution of arbitrary code.

Solution

Upgrade to HP LoadRunner 12.50 or later.

See Also

http://www.nessus.org/u?bc7af3f7

Plugin Details

Severity: Medium

ID: 85767

File Name: hp_loadrunner_HPSBMU03339.nasl

Version: 1.10

Type: local

Agent: windows

Family: Windows

Published: 9/3/2015

Updated: 11/22/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-5426

Vulnerability Information

CPE: cpe:/a:hp:loadrunner

Required KB Items: installed_sw/HP LoadRunner

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/1/2015

Vulnerability Publication Date: 9/1/2015

Exploitable With

Core Impact

Reference Information

CVE: CVE-2015-5426

HP: HPSBMU03339, SSRT102014, emr_na-c04692147