Описание
Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll.
Ссылки
- US Government Resource
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:hp:mercury_loadrunner_agent:8.0:*:*:*:*:*:*:*
cpe:2.3:a:hp:mercury_loadrunner_agent:8.1:*:*:*:*:*:*:*
cpe:2.3:a:hp:mercury_monitor_over_firewall:8.1:*:*:*:*:*:*:*
cpe:2.3:a:hp:mercury_performance_center_agent:8.0:*:*:*:*:*:*:*
cpe:2.3:a:hp:mercury_performance_center_agent:8.1:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.64475
Средний
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll.
EPSS
Процентиль: 98%
0.64475
Средний
10 Critical
CVSS2
Дефекты
NVD-CWE-Other