This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP LoadRunner. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of connections using SSL. The issue lies in the failure to validate the length of data before copying it into a fixed-size buffer. An attacker can leverage this vulnerability to gain code execution as SYSTEM.