netOctopus Agent nantsys.sys MSR Write Local Privilege Escalation

High Nessus Plugin ID 29928


The remote Windows host contains a driver that is affected by a local privilege escalation vulnerability.


netOctopus Agent, an asset management agent, is installed on the remote host.

The installed version of netOctopus Agent includes a driver, named 'nantsys.sys', that exposes a device interface writable by all local users, allowing them to read and write arbitrary CPU Model Specific Registers (MSRs). A local user could leverage this issue to execute arbitrary code in kernel mode.


Remove the affected driver using the vendor-supplied script referenced in the advisory above.

See Also

Plugin Details

Severity: High

ID: 29928

File Name: netoctopus_agent_msr_priv_escalation.nasl

Version: $Revision: 1.11 $

Type: local

Agent: windows

Family: Windows

Published: 2008/01/14

Modified: 2015/01/12

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:motorola:netoctopus

Required KB Items: SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2007-5761

BID: 27175

OSVDB: 40106

CWE: 264