CVE-2016-4359

Published on: 06/08/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:26:58 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Loadrunner from Hp contain the following vulnerability:

Stack-based buffer overflow in mchan.dll in the agent in HPE LoadRunner 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.02 through patch 2, and 12.50 through patch 3 and Performance Center 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.20 through patch 2, and 12.50 through patch 1 allows remote attackers to execute arbitrary code via a long -server_name value, aka ZDI-CAN-3516.

  • CVE-2016-4359 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Multiple HP Products Multiple Remote Code Execution and Denial of Service Vulnerabilities cve.report (archive)
text/html
URL Logo BID 90975
HPE LoadRunner Unspecified Flaws Let Remote Users Deny Service and Execute Arbitrary Code - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1036006
HPE Support document - HPE Support Center Vendor Advisory
h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05157423
[R2] HP LoadRunner mchan.dll Shared Memory Object Name Construction Remote Stack Buffer Overflow - Research Advisory | Tenable® www.tenable.com
text/html
URL Logo MISC www.tenable.com/security/research/tra-2016-16
Zero Day Initiative Third Party Advisory
VDB Entry
www.zerodayinitiative.com
text/html
URL Logo MISC www.zerodayinitiative.com/advisories/ZDI-16-363

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationHpLoadrunner11.52p3AllAll
ApplicationHpLoadrunner12.00p1AllAll
ApplicationHpLoadrunner12.01p3AllAll
ApplicationHpLoadrunner12.02p2AllAll
ApplicationHpLoadrunner12.50p1AllAll
ApplicationHpLoadrunner11.52p3AllAll
ApplicationHpLoadrunner12.00p1AllAll
ApplicationHpLoadrunner12.01p3AllAll
ApplicationHpLoadrunner12.02p2AllAll
ApplicationHpLoadrunner12.50p1AllAll
ApplicationHpPerformance Center11.52p3AllAll
ApplicationHpPerformance Center12.00p1AllAll
ApplicationHpPerformance Center12.01p3AllAll
ApplicationHpPerformance Center12.20p2AllAll
ApplicationHpPerformance Center12.50p1AllAll
ApplicationHpPerformance Center11.52p3AllAll
ApplicationHpPerformance Center12.00p1AllAll
ApplicationHpPerformance Center12.01p3AllAll
ApplicationHpPerformance Center12.20p2AllAll
ApplicationHpPerformance Center12.50p1AllAll
  • cpe:2.3:a:hp:loadrunner:11.52:p3:*:*:*:*:*:*:
  • cpe:2.3:a:hp:loadrunner:12.00:p1:*:*:*:*:*:*:
  • cpe:2.3:a:hp:loadrunner:12.01:p3:*:*:*:*:*:*:
  • cpe:2.3:a:hp:loadrunner:12.02:p2:*:*:*:*:*:*:
  • cpe:2.3:a:hp:loadrunner:12.50:p1:*:*:*:*:*:*:
  • cpe:2.3:a:hp:loadrunner:11.52:p3:*:*:*:*:*:*:
  • cpe:2.3:a:hp:loadrunner:12.00:p1:*:*:*:*:*:*:
  • cpe:2.3:a:hp:loadrunner:12.01:p3:*:*:*:*:*:*:
  • cpe:2.3:a:hp:loadrunner:12.02:p2:*:*:*:*:*:*:
  • cpe:2.3:a:hp:loadrunner:12.50:p1:*:*:*:*:*:*:
  • cpe:2.3:a:hp:performance_center:11.52:p3:*:*:*:*:*:*:
  • cpe:2.3:a:hp:performance_center:12.00:p1:*:*:*:*:*:*:
  • cpe:2.3:a:hp:performance_center:12.01:p3:*:*:*:*:*:*:
  • cpe:2.3:a:hp:performance_center:12.20:p2:*:*:*:*:*:*:
  • cpe:2.3:a:hp:performance_center:12.50:p1:*:*:*:*:*:*:
  • cpe:2.3:a:hp:performance_center:11.52:p3:*:*:*:*:*:*:
  • cpe:2.3:a:hp:performance_center:12.00:p1:*:*:*:*:*:*:
  • cpe:2.3:a:hp:performance_center:12.01:p3:*:*:*:*:*:*:
  • cpe:2.3:a:hp:performance_center:12.20:p2:*:*:*:*:*:*:
  • cpe:2.3:a:hp:performance_center:12.50:p1:*:*:*:*:*:*: