This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote Windows host is affected by multiple vulnerabilities.
The remote Windows host is affected by the following vulnerabilities :
- Multiple elevation of privilege vulnerabilities exist
that are related to the handling of objects in memory.
A local attacker can exploit these, via a crafted
application, to run arbitrary code in kernel mode.
- Multiple information disclosure vulnerabilities exist
due to a failure to properly initialize memory
addresses. A local attacker can exploit these, via a
specially crafted application, to bypass the Kernel
Address Space Layout Randomization (KASLR) and retrieve
the base address of the Kernel driver from a compromised
process. (CVE-2015-6102, CVE-2015-6109)
- Multiple remote code execution vulnerabilities exist
in the Adobe Type Manager Library due to improper
handling of specially crafted fonts. An unauthenticated,
remote attacker can exploit these, via a crafted
document or web page, to execute arbitrary code.
- A security feature bypass vulnerability exists due to
improper validation of permissions. A local attacker can
exploit this to interact with the file system in an
inappropriate manner to modify files, by using a
crafted, low-integrity-level, user-mode application.
See also :
Microsoft has released a set of patches for Vista, 2008, 7, 2008 R2,
8, 2012, 8.1, 2012 R2, and 10.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 86822 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now