HP LoadRunner lrFileIOService ActiveX Control WriteFileBinary Exploit

HP LoadRunner lrFileIOService WriteFileBinary method accepts a parameter named data that it uses as a valid pointer. By specifying invalid values an attacker can force the application to jump to a controlled location in memory. This module runs a web server waiting for vulnerable clients (Internet Explorer 6,7 or 8) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Exploit Platform
Exploit Type
Product Name