HP Security Bulletin HPSBMA02624 SSRT100195 2 - A potential vulnerability has been identified with HP LoadRunner and HP Performance Center. The vulnerability could be remotely exploited to allow execution of arbitrary code. Revision 2 of this advisory.
0ae85c56d3d2c3beefa5625a23d8aae8de8e99fbfd15ff6ec394d62fa013d7af
Zero Day Initiative Advisory 11-015 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP LoadRunner. Authentication is not required to exploit this vulnerability. The specific flaw exists within the magentproc.exe process which binds by default on TCP ports 5001, 5002, 5003, 50500, and 54345. The process blindly trusts a user supplied 32-bit value as an allocation size. It then copies data directly from a request packet into the statically allocated heap buffer. This can be abused by attackers to execute remote code under the context of the SYSTEM user.
62266d914a52b293b8f67a501b7f3a42d2ec3fa1c3626fa265445c67b595eaf6
HP Security Bulletin HPSBMA02624 SSRT100195 - A potential vulnerability has been identified with HP LoadRunner. The vulnerability could be remotely exploited to allow execution of arbitrary code. Revision 1 of this advisory.
9b6f2aa5b9992d926f70e072ae047596c67fcd66aef085a447731298d368bc36