ID CVE-2011-0673
Summary win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, aka "Win32k Null Pointer De-reference Vulnerability."
References
Vulnerable Configurations
  • Microsoft Windows XP Service Pack 3
    cpe:2.3:o:microsoft:windows_xp:-:sp3
CVSS
Base: 7.2 (as of 14-04-2011 - 12:09)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
msbulletin via4
bulletin_id MS11-034
bulletin_url
date 2011-04-12T00:00:00
impact Elevation of Privilege
knowledgebase_id 2506223
knowledgebase_url
severity Important
title Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS11-034.NASL
description The remote host is running a version of the Windows kernel that is affected by the following types of vulnerabilities : - Several use-after-free vulnerabilities exist due to the way that Windows kernel-mode drivers manage kernel-mode driver objects. (CVE-2011-0662, CVE-2011-0665, CVE-2011-0666, CVE-2011-0667, CVE-2011-0670, CVE-2011-0671, CVE-2011-0672, CVE-2011-0674, CVE-2011-0675, CVE-2011-1234, CVE-2011-1235, CVE-2011-1236, CVE-2011-1237, CVE-2011-1238, CVE-2011-1239, CVE-2011-1240, CVE-2011-1241, CVE-2011-1242) - Several NULL pointer de-reference vulnerabilities exist due to the way that Windows kernel-mode drivers manage pointers to kernel-mode driver objects. (CVE-2011-0673, CVE-2011-0676, CVE-2011-0677, CVE-2011-1225, CVE-2011-1226, CVE-2011-1227, CVE-2011-1228, CVE-2011-1229, CVE-2011-1230, CVE-2011-1231, CVE-2011-1232, CVE-2011-1233) An attacker with local access to the affected system can exploit these issues to execute arbitrary code in kernel mode and take complete control of the affected system.
last seen 2019-02-21
modified 2018-11-15
plugin id 53391
published 2011-04-13
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=53391
title MS11-034: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2506223)
oval via4
accepted 2011-05-30T04:00:43.699-04:00
class vulnerability
contributors
name Josh Turpin
organization Symantec Corporation
definition_extensions
comment Microsoft Windows XP (x86) SP3 is installed
oval oval:org.mitre.oval:def:5631
description win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, aka "Win32k Null Pointer De-reference Vulnerability."
family windows
id oval:org.mitre.oval:def:12546
status accepted
submitted 2011-02-09T13:00:00
title Win32k Null Pointer De-reference Vulnerability (CVE-2011-0673)
version 68
refmap via4
bid 47234
cert TA11-102A
confirm http://support.avaya.com/css/P8/documents/100133352
misc http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx
ms MS11-034
sectrack 1025345
secunia 44156
vupen ADV-2011-0952
xf mswin-win32k-var8-priv-escalation(66402)
Last major update 04-10-2011 - 22:52
Published 13-04-2011 - 16:26
Last modified 12-10-2018 - 17:59
Back to Top