This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote Windows host is affected by multiple vulnerabilities.
The version of Windows running on the remote host is affected by the
following vulnerabilities :
- Information disclosure vulnerabilities exist in the
kernel-mode driver that can reveal portions of kernel
memory. An attacker can exploit these and gain
information about the system, which can then be used
to launch further attacks. (CVE-2015-0077,
- A privilege escalation vulnerability exists in the
kernel-mode driver due to improper validation of thread
tokens. An authenticated attacker, using a specially
crafted application, can exploit this issue to gain
administrative credentials in order to elevate
See also :
Microsoft has released a set of patches for Windows 2003, Vista, 2008,
7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk factor :
Medium / CVSS Base Score : 6.9
CVSS Temporal Score : 5.7
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 81737 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now