MS08-001: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644)

critical Nessus Plugin ID 29893


It is possible to execute code on the remote host.


The remote version of Windows contains a version of the TCP/IP protocol that does not properly parse IGMPv3, MLDv2 and ICMP structure.

An attacker may exploit these flaws to execute code on the remote host.


Microsoft has released a set of patches for Windows 2000, XP, 2003 and Vista.

See Also

Plugin Details

Severity: Critical

ID: 29893

File Name: smb_nt_ms08-001.nasl

Version: 1.30

Type: local

Agent: windows

Published: 1/8/2008

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/8/2008

Vulnerability Publication Date: 1/8/2008

Exploitable With


Core Impact

Reference Information

CVE: CVE-2007-0066, CVE-2007-0069

BID: 27100, 27139

CERT: 115083

MSFT: MS08-001

MSKB: 941644