Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vvxm-f8ph-crhx

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in magentservice.exe in the server in HP LoadRunner 11.00 before patch 4 allows remote attackers to execute arbitrary code via a crafted size value in a packet. NOTE: it was originally reported that the affected product is HP Diagnostics Server, but HP states that "the vulnerable product is actually HP LoadRunner."

Stack-based buffer overflow in magentservice.exe in the server in HP LoadRunner 11.00 before patch 4 allows remote attackers to execute arbitrary code via a crafted size value in a packet. NOTE: it was originally reported that the affected product is HP Diagnostics Server, but HP states that "the vulnerable product is actually HP LoadRunner."

EPSS

Процентиль: 99%
0.79608
Высокий

Дефекты

CWE-119

Связанные уязвимости

nvd
около 14 лет назад

Stack-based buffer overflow in magentservice.exe in the server in HP LoadRunner 11.00 before patch 4 allows remote attackers to execute arbitrary code via a crafted size value in a packet. NOTE: it was originally reported that the affected product is HP Diagnostics Server, but HP states that "the vulnerable product is actually HP LoadRunner."

EPSS

Процентиль: 99%
0.79608
Высокий

Дефекты

CWE-119