KB2914486: Vulnerability in Microsoft Windows Kernel Could Allow Elevation of Privilege

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has a privilege elevation vulnerability in a
system-provided communications driver.

Description :

The remote host has an unspecified privilege elevation vulnerability
in NDProxy.sys, a system-provided communications driver. Successful
exploitation of this vulnerability could allow an attacker to run
arbitrary code in kernel mode. Additionally, the attacker could view,
change or even delete data, as well as install programs and/or create
new accounts with full administrative rights.

See also :

http://technet.microsoft.com/en-us/security/advisory/2914486
http://www.nessus.org/u?372a0377

Solution :

Apply the workaround referenced in Microsoft Security Advisory
(2914486). This workaround will cause certain services that rely on
Windows Telephony Application Programming Interfaces (TAPI) to not
function. Refer to the advisory for more information.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:W/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 71140 ()

Bugtraq ID: 63971

CVE ID: CVE-2013-5065

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now