The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of HP LoadRunner: buffer overflow via Virtual User

Synthesis of the vulnerability 

An attacker can create a malicious Virtual User file, in order to create a buffer overflow in HP LoadRunner, and to execute code.
Impacted systems: LoadRunner.
Severity of this alert: 2/4.
Creation date: 07/06/2011.
Références of this alert: BID-48073, c03216705, CVE-2011-2328, HPSBMU02785, SSRT100526, VIGILANCE-VUL-10721, VU#987308.

Description of the vulnerability 

The HP LoadRunner product simulates users (Virtual User) in order to test an application under load.

Virtual Users are defined in a file with the ".usr" extension. The Vuser User Generator (VuGen.exe) application is called to open ".usr" files. However, when directives in a ".usr" file are too long, a buffer overflow occurs in VuGen.exe.

An attacker can therefore create a malicious Virtual User file, in order to create a buffer overflow in HP LoadRunner, and to execute code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This threat impacts software or systems such as LoadRunner.

Our Vigil@nce team determined that the severity of this computer threat is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this cybersecurity bulletin.

Solutions for this threat 

HP LoadRunner: version 11.00 patch 4.
The version 11.00 patch 4 is corrected:
  http://support.openview.hp.com/selfsolve/patches
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerabilities workaround. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.