Vulnerability Note VU#485744

Flexera Software FlexNet Publisher lmgrd contains a buffer overflow vulnerability

Original Release date: 22 Feb 2016 | Last revised: 04 Apr 2016


Flexera Software FlexNet Publisher, including all versions prior to, lmgrd and custom vendor daemon servers contain a buffer overflow vulnerability that may be leveraged to gain code execution.


Flexera Software FlexNet Publisher is a software license manager that provides licensing models and solutions for software vendors. A buffer overflow vulnerability in a string copying function of lmgrd and custom vendor daemon servers may enable a remote attacker to execute arbitrary code in affected server hosts.

For more information, refer to the researchers' blog post and advisory.


A remote, unauthenticated attacker may be able to execute arbitrary code in affected server hosts.


Apply an update

Software vendors that distribute vulnerable lmgrd or vendor daemon components should obtain FlexNet Publisher 2015 ( Security Update 1 or later from Flexera Software's Product and License Center. Users of affected software should contact product vendors for update information.

Vendor Information (Learn More)

Note that any vendor that distributes lmgrd or a customized version with their products may be affected. As the CERT/CC becomes aware of specific vendors and products, we will add them to the list below.

VendorStatusDate NotifiedDate Updated
CitrixAffected-10 Mar 2016
Flexera SoftwareAffected-22 Feb 2016
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 10.0 AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal 7.8 E:POC/RL:OF/RC:C
Environmental 5.9 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND



Thanks to Matthew Benton, Ryan Wincey, and Richard Kelley for reporting this vulnerability.

This document was written by Joel Land.

Other Information

  • CVE IDs: CVE-2015-8277
  • Date Public: 22 Feb 2016
  • Date First Published: 22 Feb 2016
  • Date Last Updated: 04 Apr 2016
  • Document Revision: 26


If you have feedback, comments, or additional information about this vulnerability, please send us email.