Unrated severityNVD Advisory· Published Nov 12, 2008· Updated Apr 23, 2026
CVE-2008-4037
CVE-2008-4037
Description
Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834.
Affected products
17- cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:server_2003:sp1:*:*:*:*:*:*+ 9 more
- cpe:2.3:o:microsoft:windows:server_2003:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows:server_2003:sp1:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows:server_2003:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows:server_2003:unknown:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows:xp:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows:xp:sp2:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows:xp:sp3:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows:xp:unknown:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*+ 2 more
- cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:*:x32:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:*:x64:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- www.securityfocus.com/bid/7385nvdExploitPatch
- www.securityfocus.com/data/vulnerabilities/exploits/backrush.patchnvdExploit
- www.securityfocus.com/data/vulnerabilities/exploits/backrush.patch.READMEnvdExploit
- secunia.com/advisories/32633nvdVendor Advisory
- www.vupen.com/english/advisories/2008/3110nvdVendor Advisory
- www.us-cert.gov/cas/techalerts/TA08-316A.htmlnvdUS Government Resource
- marc.infonvd
- osvdb.org/49736nvd
- securitytracker.com/idnvd
- www.networkworld.com/news/2008/111208-microsoft-seven-year-security-patch.htmlnvd
- www.veracode.com/blog/2008/11/microsoft-fixes-8-year-old-design-flaw-in-smb/nvd
- www.xfocus.net/articles/200305/smbrelay.htmlnvd
- docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-068nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6012nvd
- www.exploit-db.com/exploits/7125nvd
News mentions
0No linked articles in our index yet.