This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The Microsoft Antimalware Client on the remote host is affected by a
privilege escalation vulnerability.
The remote host is running a version of the Microsoft Antimalware
Client that could allow elevation of privilege due to the way that
pathnames are used. By successfully exploiting this vulnerability, an
attacker could execute arbitrary code and take complete control of an
affected system. But the attacker must have valid login credentials in
order to exploit the vulnerability and it cannot be exploited by
See also :
Microsoft has released a set of patches for Windows 8.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.3
Public Exploit Available : false
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 65881 ()
Bugtraq ID: 58847
CVE ID: CVE-2013-0078
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.