MS08-068: Vulnerability in SMB Could Allow Remote Code Execution (957097)

high Nessus Plugin ID 34743


It is possible to execute code on the remote host.


The remote version of Windows contains a version of SMB (Server Message Block) protocol that is vulnerable to a credentials reflection attack.

An attacker may exploit this flaw to elevate his privileges and gain control of the remote host.


Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008.

See Also

Plugin Details

Severity: High

ID: 34743

File Name: smb_nt_ms08-068.nasl

Version: 1.29

Type: local

Agent: windows

Published: 11/12/2008

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: Critical

Score: 9.4


Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/11/2008

Vulnerability Publication Date: 11/11/2008

Exploitable With

Core Impact

Metasploit (MS08-068 Microsoft Windows SMB Relay Code Execution)

Reference Information

CVE: CVE-2008-4037

BID: 7385

CWE: 287

MSFT: MS08-068

MSKB: 957097