Summary
This host is missing a critical security update according to Microsoft Bulletin MS08-068.
Impact
Successful exploitation could allow attacker to replay the user's credentials back to them and execute code in the context of the logged-on user. They can get complete control of an affected system to view, change, or delete data or creating new accounts with full user rights.
complete control of an affected system.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms08-068.mspx
Insight
Issue exists due to the way that Server Message Block (SMB) Protocol handles NTLM credentials when a user connects to an attacker's SMB server.
Affected
Microsoft Windows 2K Service Pack 4 and prior.
Microsoft Windows XP Service Pack 3 and prior.
Microsoft Windows 2003 Service Pack 2 and prior.
Microsoft Windows Vista Service Pack 1 and prior.
Microsoft Windows 2008 Server Service Pack 1 and prior.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-4037 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Checks for MS HOTFIX for snmp buffer overruns
- Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
- Cumulative Security Update for Internet Explorer (950759)
- ISA Server 2000 and Proxy Server 2.0 Internet Content Spoofing (888258)
- Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)