ID CVE-2017-5789
Summary HPE LoadRunner before 12.53 Patch 4 and HPE Performance Center before 12.53 Patch 4 allow remote attackers to execute arbitrary code via unspecified vectors. At least in LoadRunner, this is a libxdrutil.dll mxdr_string heap-based buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:hp:loadrunner:12.53
    cpe:2.3:a:hp:loadrunner:12.53
  • cpe:2.3:a:hp:performance_center:12.53
    cpe:2.3:a:hp:performance_center:12.53
CVSS
Base: 7.5
Impact:
Exploitability:
CWE CWE-284
CAPEC
  • Embedding Scripts within Scripts
    An attack of this type exploits a programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts. The attacker leverages this capability to execute scripts to execute his/her own script by embedding it within other scripts that the target software is likely to execute. The attacker must have the ability to inject script into script that is likely to be executed. If this is done, then the attacker can potentially launch a variety of probes and attacks against the web server's local environment, in many cases the so-called DMZ, back end resources the web server can communicate with, and other hosts. With the proliferation of intermediaries, such as Web App Firewalls, network devices, and even printers having JVMs and Web servers, there are many locales where an attacker can inject malicious scripts. Since this attack pattern defines scripts within scripts, there are likely privileges to execute said attack on the host. Of course, these attacks are not solely limited to the server side, client side scripts like Ajax and client side JavaScript can contain malicious scripts as well. In general all that is required is for there to be sufficient privileges to execute a script, but not protected against writing.
  • Signature Spoofing by Key Theft
    An attacker obtains an authoritative or reputable signer's private signature key by theft and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
nessus via4
  • NASL family Windows
    NASL id HP_LOADRUNNER_HPESBGN03712.NASL
    description The version of HP LoadRunner installed on the remote Windows host is prior to 12.53 patch 4. It is, therefore, affected by a remote code execution vulnerability due to a heap-based buffer overflow condition in the mxdr_string() function in libxdrutil.dll. An unauthenticated, remote attacker can exploit this to execute arbitrary code.
    last seen 2017-11-04
    modified 2017-03-24
    plugin id 97888
    published 2017-03-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=97888
    title HPE LoadRunner < 12.53 Patch 4 libxdrutil.dll mxdr_string() RCE
  • NASL family Windows
    NASL id HP_PERFORMANCE_CENTER_HPESBGN03712.NASL
    description The version of HP Performance Center installed on the remote Windows host is prior to 12.53 Patch 4. It is, therefore, affected by a remote code execution vulnerability due to a heap-based buffer overflow condition in the mxdr_string() function in libxdrutil.dll. An unauthenticated, remote attacker can exploit this to execute arbitrary code.
    last seen 2017-11-04
    modified 2017-03-24
    plugin id 97889
    published 2017-03-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=97889
    title HP Performance Center < 12.53 Patch 4 libxdrutil.dll mxdr_string() RCE
refmap via4
bid
  • 101224
  • 96774
confirm https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03712en_us
misc
sectrack
  • 1038028
  • 1038029
Last major update 11-10-2017 - 17:29
Published 11-10-2017 - 17:29
Last modified 16-02-2018 - 21:29
Back to Top