Summary
The vulnerability is in the Windows Server service, which mishandles specially crafted RPC requests over SMB. On Windows 2000, Windows XP, and Windows Server 2003, an attacker can exploit it without authentication; on Windows Vista and Windows Server 2008, the vulnerable code path requires authentication. A successful exploit can give the attacker complete remote control of the system and was considered wormable.
Why Fix Soon?
5/6Exploitation Details
Execute arbitrary code remotely and take complete control of the host.
RCE (Remote Code Execution)Affected Software
| Product | Affected Versions |
|---|---|
| Microsoft Windows | Windows 2000 Service Pack 4; Windows XP Service Pack 2/3; Windows XP Professional x64 Edition Service Pack 2; Windows Server 2003 Service Pack 1/2; Windows Server 2003 x64 Edition Service Pack 1/2; Windows Server 2003 Itanium-based Systems Service Pack 1/2; Windows Vista/Vista Service Pack 1; Windows Vista x64 Edition/Vista x64 Edition Service Pack 1; Windows Server 2008 (32-bit/x64/Itanium, including Server Core); Windows 7 Pre-Beta |
Microsoft Windows operating system family for desktops and servers, used for endpoint, file, print, and application hosting.
Affected ComponentServer service RPC request handling for SMB-based file and print sharing.
Server service RPC request handling for SMB-based file and print sharing.
Disable the Server and Computer Browser services, or block TCP 139 and 445; on Vista/Server 2008, also filter RPC UUID 4b324fc8-1670-01d3-1278-5a47bf6ee188.
Disable the Server and Computer Browser services, or block TCP 139 and 445; on Vista/Server 2008, also filter RPC UUID 4b324fc8-1670-01d3-1278-5a47bf6ee188.
Apply Microsoft security update KB958644 (MS08-067) on all affected Windows versions.
Apply Microsoft security update KB958644 (MS08-067) on all affected Windows versions.
Not available
Probability of exploitation in the next 30 days
Worse than 100% of all CVEs
No known threat actors
NVD Data
Description Summary
CVSS Base Score
CVSS Vector (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Affected Software (CPE) (18)
- •cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
- •cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:-:*:itanium:*
- •cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*
- •cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
- •cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:itanium:*
- •cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x64:*
- •cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:-:*:x86:*
- •cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*
- •cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*
- •cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
- •cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
- •cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
Sources
| Source | Article |
|---|---|
| www.cisa.gov | Known Exploited Vulnerabilities Catalog |
| nvd.nist.gov | CVE-2008-4250 Detail |
| learn.microsoft.com | Microsoft Security Bulletin MS08-067 - Critical |
| support.microsoft.com | MS08-067: Vulnerability in Server service could allow remote code execution |
| www.microsoft.com | MS08-067 Released |
| nmap.org | smb-vuln-ms08-067 NSE script |
| www.rapid7.com | MS08-067 Microsoft Server Service Relative Path Stack Corruption |
| www.snort.org | Rule Document 1:15053 |
| www.juniper.net | SMB: Microsoft Windows Server Service Crafted RPC Request |
| www.tenable.com | CVE-2008-4250 |
Priority History
Initial analysis