Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/32390 | vdb entry |
http://www.zerodayinitiative.com/advisories/ZDI-07-007.html | vendor advisory |
http://securitytracker.com/id?1017612 | vdb entry |
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854250 | vendor advisory |
http://osvdb.org/33132 | vdb entry |
http://www.ciac.org/ciac/bulletins/r-123.shtml | third party advisory government resource |
http://www.securityfocus.com/archive/1/459505/100/0/threaded | mailing list |
http://www.kb.cert.org/vuls/id/303012 | third party advisory us government resource |
http://www.vupen.com/english/advisories/2007/0535 | vdb entry |
http://secunia.com/advisories/24112 | third party advisory |
http://securitytracker.com/id?1017613 | vdb entry |
http://www.securityfocus.com/bid/22487 | vdb entry |
http://securitytracker.com/id?1017611 | vdb entry |