CVE-2016-4359
Published Jun 8, 2016
Last updated 7 years ago
Overview
- Description
- Stack-based buffer overflow in mchan.dll in the agent in HPE LoadRunner 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.02 through patch 2, and 12.50 through patch 3 and Performance Center 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.20 through patch 2, and 12.50 through patch 1 allows remote attackers to execute arbitrary code via a long -server_name value, aka ZDI-CAN-3516.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:loadrunner:11.52:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA41E4F9-3325-4665-A433-BDAA02621F13" }, { "criteria": "cpe:2.3:a:hp:loadrunner:12.00:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58DEE82F-A703-4F0D-96D4-47E6DEC473BC" }, { "criteria": "cpe:2.3:a:hp:loadrunner:12.01:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B9BA232-B8DD-4EC9-991F-06E73774A156" }, { "criteria": "cpe:2.3:a:hp:loadrunner:12.02:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7226CD8-1528-4C5B-825D-2569D025808C" }, { "criteria": "cpe:2.3:a:hp:loadrunner:12.50:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FBCB098-3822-4C54-AA84-7C7E5751B929" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:performance_center:11.52:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BACEBCB-93A4-4C8C-90DD-3D233BF9B128" }, { "criteria": "cpe:2.3:a:hp:performance_center:12.00:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27EAC034-46D2-41A8-A3F5-7ABDCC7E9457" }, { "criteria": "cpe:2.3:a:hp:performance_center:12.01:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0DEA9F8-EF3D-4C7F-B6B9-F9A33341E9A5" }, { "criteria": "cpe:2.3:a:hp:performance_center:12.20:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7FCF452-A5B1-4CB5-BD02-785670A04E82" }, { "criteria": "cpe:2.3:a:hp:performance_center:12.50:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "235AB949-A179-48FC-BFAA-7796578E430D" } ], "operator": "OR" } ] } ]