This script is Copyright (C) 2007-2017 Tenable Network Security, Inc.
The remote Windows host has a program that is susceptible to a buffer
DriveLock, an application for controlling access to computer devices,
is installed on the remote host.
According to its version, the DriveLock Agent component, which acts as
a web server, on the remote host fails to properly handle long HTTP
requests. An unauthenticated, remote attacker may be able to leverage
this issue to execute arbitrary code on the affected host with SYSTEM
Upgrade to DriveLock version 184.108.40.2064 / 220.127.116.117 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false