MS08-001: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644)

critical Nessus Plugin ID 29893

Synopsis

It is possible to execute code on the remote host.

Description

The remote version of Windows contains a version of the TCP/IP protocol that does not properly parse IGMPv3, MLDv2 and ICMP structure.

An attacker may exploit these flaws to execute code on the remote host.

Solution

Microsoft has released a set of patches for Windows 2000, XP, 2003 and Vista.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-001

Plugin Details

Severity: Critical

ID: 29893

File Name: smb_nt_ms08-001.nasl

Version: 1.30

Type: local

Agent: windows

Published: 1/8/2008

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/8/2008

Vulnerability Publication Date: 1/8/2008

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2007-0066, CVE-2007-0069

BID: 27100, 27139

CERT: 115083

MSFT: MS08-001

MSKB: 941644