Page 2 of 6 results (0.001 seconds)

CVSS: 10.0EPSS: 77%CPEs: 5EXPL: 0

Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll. Desbordamiento de búfer basado en pila en magentproc.exe para Hewlett-Packard Mercury LoadRunner Agent 8.0 y 8.1, Performance Center Agent 8.0 y 8.1, y Monitor sobre el Firewall 8.1 permite a atacantes remotos ejecutar código de su elección a través de un paquete con un campo server_ip_name en el puerto TCP 54345, lo cual dispara el desbordamiento en mchan.dll. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Mercury LoadRunner Agent, Mercury Performance Center Agent and Mercury Monitor over Firewall. Authentication is not required to exploit this vulnerability. The specific flaw exists within the process magentproc.exe that binds to TCP port 54345. When parsing packets containing an overly long 'server_ip_name' field, an exploitable stack overflow may be triggered due to an an inline strcpy() within the library mchan.dll. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854250 http://osvdb.org/33132 http://secunia.com/advisories/24112 http://securitytracker.com/id?1017611 http://securitytracker.com/id?1017612 http://securitytracker.com/id?1017613 http://www.ciac.org/ciac/bulletins/r-123.shtml http://www.kb.cert.org/vuls/id/303012 http://www.securityfocus.com/archive/1/459505/100/0/threaded http://www.securityfocus.com/bid/22487 http://www.vupen.com/english/advis •