Vulnerabilities > CVE-2007-0446 - Unspecified vulnerability in HP products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN hp
nessus
Summary
Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Nessus
NASL family | Gain a shell remotely |
NASL id | LOADRUNNER_AGENT_SERVER_IP_NAME_OVERFLOW.NASL |
description | The version of the LoadRunner Agent installed on the remote host contains a buffer overflow in |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24327 |
published | 2007-02-13 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24327 |
title | Mercury LoadRunner Agent server_ip_name Field Remote Buffer Overflow |
code |
|
Saint
bid | 22487 |
description | HP Mercury LoadRunner mchan.dll buffer overflow |
id | misc_mercuryloadrunnerbo |
osvdb | 33132 |
title | hp_mercury_mchan |
type | remote |
References
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854250
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854250
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854250
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854250
- http://osvdb.org/33132
- http://osvdb.org/33132
- http://secunia.com/advisories/24112
- http://secunia.com/advisories/24112
- http://securitytracker.com/id?1017611
- http://securitytracker.com/id?1017611
- http://securitytracker.com/id?1017612
- http://securitytracker.com/id?1017612
- http://securitytracker.com/id?1017613
- http://securitytracker.com/id?1017613
- http://www.ciac.org/ciac/bulletins/r-123.shtml
- http://www.ciac.org/ciac/bulletins/r-123.shtml
- http://www.kb.cert.org/vuls/id/303012
- http://www.kb.cert.org/vuls/id/303012
- http://www.securityfocus.com/archive/1/459505/100/0/threaded
- http://www.securityfocus.com/archive/1/459505/100/0/threaded
- http://www.securityfocus.com/bid/22487
- http://www.securityfocus.com/bid/22487
- http://www.vupen.com/english/advisories/2007/0535
- http://www.vupen.com/english/advisories/2007/0535
- http://www.zerodayinitiative.com/advisories/ZDI-07-007.html
- http://www.zerodayinitiative.com/advisories/ZDI-07-007.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32390
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32390