This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Windows host contains an application that is prone to a
buffer overflow vulnerability.
The version of the Kaspersky product installed on the remote host
contains a stack-based overflow in its 'kl1.sys' kernel driver
involving its handling of IOCTL 0x800520e8. A local attacker may be
able to leverage this issue to gain complete control of the affected
See also :
Update the virus signatures after 06/03/2008 and restart the computer.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.3
Public Exploit Available : false