This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.
A Windows component on the remote host is affected by a vulnerability
that could allow escalation of privileges.
The Consent User Interface (UI) component of the remote Windows host
does not properly process a registry key that has been set to a
An attacker who can log on locally to the affected system and has the
'Impersonate a client after authentication' user right
(SeImpersonatePrivilege) can exploit this to run arbitrary code with
See also :
Microsoft has released a set of patches for Windows Vista, 2008, 7, and
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.3
Public Exploit Available : false