Hewlett-Packard LoadRunner micWebAjax.dll ActiveX Control NotifyEvent Remote Code Execution VulnerabilityZDI-13-202: August 13th, 2013
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 13112. For further product information on the TippingPoint IPS:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP LoadRunner. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the micWebAjax.dll ActiveX control. The control exposes the NotifyEvent method. The method performs insufficient bounds checking on user-supplied data which results in stack corruption. An attacker can leverage this situation to execute code under the context of the user running the browser.
Vendor ResponseHewlett-Packard has issued an update to correct this vulnerability. More details can be found at:
2013-01-22 - Vulnerability reported to vendor
2013-08-13 - Coordinated public release of advisory
CreditThis vulnerability was discovered by:
Andrea Micalizzi aka rgod