|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gain root remotely >> Mercury LoadRunner Agent server_ip_name Buffer Overflow Vulnerability Vulnerability Assessment Details
|
Mercury LoadRunner Agent server_ip_name Buffer Overflow Vulnerability |
||
Sends an invalid request to a LoadRunner agent Detailed Explanation for this Vulnerability Assessment Summary : The remote server is affected by a buffer overflow vulnerability. Description : The version of the LoadRunner Agent installed on the remote host contains a buffer overflow in 'mchan.dll' that can be exploited by an unauthenticated remote attacker using a request with a long 'server_ip_name' field to crash the affected service or execute arbitrary code subject to the permissions of the user id under which the agent runs. See also : http://www.zerodayinitiative.com/advisories/ZDI-07-007.html http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0177.html http://www.nessus.org/u?5a833d9e Solution : Apply the appropriate patch as listed in the vendor advisory referenced above. Network Security Threat Level: Critical / CVSS Base Score : 10.0 (AV:R/AC:L/Au:NR/C:C/I:C/A:C/B:N) Networks Security ID: 22487 Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |