Executive Summary

Summary
Title HP Performance Center Agent on Windows, Remote Unauthenticated Arbitrary Code Execution
Informations
Name HPSBMA02528 SSRT100106 First vendor Publication 2010-05-10
Vendor HP Last vendor Modification 2010-05-10
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A potential security vulnerability has been identified with the HP Performance Center Agent running on Windows. The vulnerability could be exploited by a remote unauthenticated user to execute arbitrary code.

Original Source

Url : http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02153865

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 17
Application 2

Open Source Vulnerability Database (OSVDB)

Id Description
64437 HP Mercury LoadRunner Agent magentproc.exe Remote Arbitrary Code Execution

Snort® IPS/IDS

Date Description
2018-02-14 HP LoadRunner remote command execution attempt
RuleID : 45440 - Revision : 2 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2010-05-07 Name : It is possible to execute arbitrary commands on the remote system.
File : loadrunner_agent_remote_command_execution.nasl - Type : ACT_ATTACK