MS08-068: Vulnerability in SMB Could Allow Remote Code Execution (957097)

high Nessus Plugin ID 34743

Synopsis

It is possible to execute code on the remote host.

Description

The remote version of Windows contains a version of SMB (Server Message Block) protocol that is vulnerable to a credentials reflection attack.

An attacker may exploit this flaw to elevate his privileges and gain control of the remote host.

Solution

Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-068

Plugin Details

Severity: High

ID: 34743

File Name: smb_nt_ms08-068.nasl

Version: 1.29

Type: local

Agent: windows

Published: 11/12/2008

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/11/2008

Vulnerability Publication Date: 11/11/2008

Exploitable With

Core Impact

Metasploit (MS08-068 Microsoft Windows SMB Relay Code Execution)

Reference Information

CVE: CVE-2008-4037

BID: 7385

CWE: 287

MSFT: MS08-068

MSKB: 957097