MS07-063: Vulnerability in SMBv2 Could Allow Remote Code Execution (942624) (uncredentialed check)

critical Nessus Plugin ID 29855


It is possible to execute arbitrary code on the remote host.


The remote version of Windows contains a version of SMBv2 (Server Message Block) protocol that is affected by several vulnerabilities.

An attacker may exploit these flaws to elevate his privileges and gain control of the remote host.


Microsoft has released a set of patches for Windows Vista.

See Also

Plugin Details

Severity: Critical

ID: 29855

File Name: smb_kb942624.nasl

Version: 1.33

Type: remote

Agent: windows

Family: Windows

Published: 1/7/2008

Updated: 1/26/2022

Supported Sensors: Nessus Agent

Risk Information

CVSS Score Source: CVE-2007-5351


Risk Factor: Medium

Score: 6.5


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: Host/OS/smb

Exploit Ease: No known exploits are available

Patch Publication Date: 12/11/2007

Vulnerability Publication Date: 12/11/2007

Reference Information

CVE: CVE-2007-5351

BID: 26777

MSFT: MS07-063

IAVT: 2007-T-0049-S

MSKB: 942624

CWE: 94