MS08-001: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644)

Critical Nessus Plugin ID 29893

Synopsis

It is possible to execute code on the remote host.

Description

The remote version of Windows contains a version of the TCP/IP protocol that does not properly parse IGMPv3, MLDv2 and ICMP structure.

An attacker may exploit these flaws to execute code on the remote host.

Solution

Microsoft has released a set of patches for Windows 2000, XP, 2003 and Vista.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-001

Plugin Details

Severity: Critical

ID: 29893

File Name: smb_nt_ms08-001.nasl

Version: 1.30

Type: local

Agent: windows

Published: 2008/01/08

Updated: 2018/11/15

Dependencies: 13855, 57033

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/01/08

Vulnerability Publication Date: 2008/01/08

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2007-0066, CVE-2007-0069

BID: 27100, 27139

CERT: 115083

MSFT: MS08-001

MSKB: 941644