This script is Copyright (C) 2008-2017 Tenable Network Security, Inc.
The remote Windows host has an application that is affected by a local
privilege escalation vulnerability.
The remote host contains a version of Sun xVM VirtualBox, an open
source virtualization platform, before 1.6.4. Such versions reportedly
include a kernel driver, 'VBoxDrv.sys', that allows a local user to
open the device '\\.\VBoxDrv' and issue IOCTLs with a buffering method
of 'METHOD_NEITHER' without any validation. Using specially crafted
input, an unprivileged user can leverage this issue to execute
arbitrary code in kernel mode.
See also :
Upgrade to Sun xVM VirtualBox 1.6.4 or later.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.6
Public Exploit Available : true