This script is Copyright (C) 2004-2017 Tenable Network Security, Inc.
The remote Windows host is affected by a memory corruption
The remote Windows host has an ASN.1 library with a vulnerability that
could allow an attacker to execute arbitrary code on this host.
To exploit this flaw, an attacker would need to send a specially
crafted ASN.1 encoded packet with improperly advertised lengths.
This particular check sent a malformed HTML authorization packet and
determined that the remote host is not patched.
See also :
Apply the patch referenced above.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true