SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   HPE LoadRunner Vendors:   HPE
HP Mercury LoadRunner Agent Lets Remote Users Execute Arbitrary Commands
SecurityTracker Alert ID:  1023946
SecurityTracker URL:  http://securitytracker.com/id/1023946
CVE Reference:   CVE-2010-1549   (Links to External Site)
Updated:  May 11 2010
Original Entry Date:  May 6 2010
Impact:   Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 9.50
Description:   A vulnerability was reported in HP Mercury LoadRunner. A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted data to the 'magentproc.exe' process on TCP port 54345 to cause 'mchan.dll' to execute arbitrary commands on the target system. The commands will run with System privileges.

The vendor was notified on March 19, 2007.

HP Performance Center Agent is also affected.

Tenable Network Security reported this vulnerability via TippingPoint.

Impact:   A remote user can execute arbitrary commands on the target system with System privileges.
Solution:   The vendor has issued a fix (9.50). The 'Secure Channel' feature that corrects this vulnerability is not enabled by default.

The vendor's advisories are available at:

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00912968
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02153865

Vendor URL:  h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00912968 (Links to External Site)
Cause:   Authentication error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC