This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote host has an antivirus application that is affected by a
security bypass vulnerability.
The remote Windows host has McAfee VirusScan Enterprise version 8.5 or
8.7. It is, therefore, affected by a security bypass vulnerability due
to a failure to properly interact with the processing of 'hcp://' URLs.
This can lead to malware execution prior to detection.
See also :
Apply the patch from Microsoft Bulletin MS10-042 or enable VirusScan
Enterprise access protection rule 'Disable HCP URLs in Internet
Explorer' (requires Buffer Overflow and Access Protection DAT Version
516 or greater).
Risk factor :
Medium / CVSS Base Score : 6.4
CVSS Temporal Score : 6.1
Public Exploit Available : true