This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote Windows host is affected by a security bypass
The remote Windows host is affected by a security feature bypass
vulnerability in Microsoft Remote Procedure Call (LRPC). The
vulnerability is due to RPC improperly freeing malformed messages,
allowing an attacker to fill up the address space of a process.
Successful exploitation of the issue allows an attacker to bypass the
Address Space Layout Randomization (ASLR) security feature.
See also :
Microsoft has released a set of patches for Windows 7, 2008 R2, 8,
2012, 8.1, and 2012 R2.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : false