This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Windows host contains an application that is prone to a
local privilege escalation vulnerability.
WinPcap, a packet capture and filtering engine, is installed on the
remote Windows host.
The version of WinPcap on the remote host enables a local user to
execute arbitrary code in kernel context because it fails to
sufficiently sanitize Interrupt Request Packet parameters before
passing them to the BIOCGSTATS IOCTL.
See also :
Upgrade to WinPcap version 4.0.1 or later.
Risk factor :
Medium / CVSS Base Score : 6.6
CVSS Temporal Score : 5.5
Public Exploit Available : true