This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote Windows host contains a VPN client that is affected by a
stack-based buffer overflow vulnerability.
The remote Windows host contains TheGreenBow VPN client, an IPsec VPN
The installed version of TheGreenBow VPN Client is earlier than
4.65.003 or is an unpatched instance of 4.65.003. As such, it is
reportedly affected by a local stack based buffer overflow caused by a
boundary error when processing an overly long 'OpenScriptAfterUp'
parameter of the 'tgb' policy file.
An attacker, exploiting this flaw, could potentially execute arbitrary
code subject to the privileges of the user running the affected
See also :
Upgrade to TheGreenBow VPN client version 22.214.171.124 if necessary and
apply the patch referenced in the vendor's advisory.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false