WinPcap NPF.SYS Local Privilege Escalation

This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that is prone to a
local privilege escalation vulnerability.

Description :

WinPcap, a packet capture and filtering engine, is installed on the
remote Windows host.

The version of WinPcap on the remote host enables a local user to
execute arbitrary code in kernel context because it fails to
sufficiently sanitize Interrupt Request Packet parameters before
passing them to the BIOCGSTATS IOCTL.

See also :

http://www.nessus.org/u?f7147d8d
http://www.securityfocus.com/archive/1/473223/30/0/threaded
http://www.winpcap.org/misc/changelog.htm

Solution :

Upgrade to WinPcap version 4.0.1 or later.

Risk factor :

Medium / CVSS Base Score : 6.6
(CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 5.5
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 25684 ()

Bugtraq ID: 24829

CVE ID: CVE-2007-3681

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now