MS07-063: Vulnerability in SMBv2 Could Allow Remote Code Execution (942624) (uncredentialed check)

critical Nessus Plugin ID 29855

Synopsis

It is possible to execute arbitrary code on the remote host.

Description

The remote version of Windows contains a version of SMBv2 (Server Message Block) protocol that is affected by several vulnerabilities.

An attacker may exploit these flaws to elevate his privileges and gain control of the remote host.

Solution

Microsoft has released a set of patches for Windows Vista.

See Also

http://www.nessus.org/u?ec44f5b5

Plugin Details

Severity: Critical

ID: 29855

File Name: smb_kb942624.nasl

Version: 1.33

Type: remote

Agent: windows

Family: Windows

Published: 1/7/2008

Updated: 1/26/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2007-5351

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: Host/OS/smb

Exploit Ease: No known exploits are available

Patch Publication Date: 12/11/2007

Vulnerability Publication Date: 12/11/2007

Reference Information

CVE: CVE-2007-5351

BID: 26777

CWE: 94

IAVT: 2007-T-0049-S

MSFT: MS07-063

MSKB: 942624