CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
98.2%
Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll.
Vendor | Product | Version | CPE |
---|---|---|---|
hp | mercury_loadrunner_agent | 8.0 | cpe:2.3:a:hp:mercury_loadrunner_agent:8.0:*:*:*:*:*:*:* |
hp | mercury_loadrunner_agent | 8.1 | cpe:2.3:a:hp:mercury_loadrunner_agent:8.1:*:*:*:*:*:*:* |
hp | mercury_monitor_over_firewall | 8.1 | cpe:2.3:a:hp:mercury_monitor_over_firewall:8.1:*:*:*:*:*:*:* |
hp | mercury_performance_center_agent | 8.0 | cpe:2.3:a:hp:mercury_performance_center_agent:8.0:*:*:*:*:*:*:* |
hp | mercury_performance_center_agent | 8.1 | cpe:2.3:a:hp:mercury_performance_center_agent:8.1:*:*:*:*:*:*:* |
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854250
osvdb.org/33132
secunia.com/advisories/24112
securitytracker.com/id?1017611
securitytracker.com/id?1017612
securitytracker.com/id?1017613
www.ciac.org/ciac/bulletins/r-123.shtml
www.kb.cert.org/vuls/id/303012
www.securityfocus.com/archive/1/459505/100/0/threaded
www.securityfocus.com/bid/22487
www.vupen.com/english/advisories/2007/0535
www.zerodayinitiative.com/advisories/ZDI-07-007.html
exchange.xforce.ibmcloud.com/vulnerabilities/32390