This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.
The remote host is affected by multiple vulnerabilities.
The remote Windows host is missing a security update. It is,
therefore, affected by multiple flaws in the Win32k kernel-mode driver
due to improper handling of objects in memory. An authenticated,
remote attacker can exploit these, via a specially crafted
application, to elevate privileges, allowing the execution of
arbitrary code in kernel mode.
See also :
Microsoft has released a set of patches for Vista, 2008, 7, 2008 R2,
2012, 8.1, RT 8.1, 2012 R2, and 10.
Risk factor :
High / CVSS Base Score : 9.0
CVSS Temporal Score : 7.0
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 89756 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now