This script is Copyright (C) 2011-2017 Tenable Network Security, Inc.
The remote Windows host has an application running that is affected by
a remote code execution vulnerability.
The version of the StreamProcess.exe component included with the
Citrix Provisioning Services installation running on the remote
Windows host fails to validate user-supplied input in a packet type of
0x40020010 before copying it into a fixed length buffer on the stack.
An unauthenticated, remote attacker can exploit this, via a specially
crafted 0x40020010 packet sent to UDP port 6095, to execute arbitrary
code on the remote host with SYSTEM privileges.
See also :
Apply the relevant patch referenced in the vendor's advisory.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true