Lucene search

K
zdiTenable Network SecurityZDI-16-363
HistoryJun 03, 2016 - 12:00 a.m.

Hewlett Packard Enterprise LoadRunner Shared Memory Name Construction Remote Code Execution Vulnerability

2016-06-0300:00:00
Tenable Network Security
www.zerodayinitiative.com
10

EPSS

0.317

Percentile

97.1%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise LoadRunner. Authentication is not required to exploit this vulnerability. The specific flaw exists within mchan.dll when constructing a shared memory file name. The issue lies in the failure to validate the size of a user-supplied string prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process.

EPSS

0.317

Percentile

97.1%