ID CVE-2011-1229
Summary win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
References
Vulnerable Configurations
  • Microsoft Windows 2003 Server Service Pack 2
    cpe:2.3:o:microsoft:windows_2003_server:-:sp2
  • Microsoft Windows 7
    cpe:2.3:o:microsoft:windows_7
  • cpe:2.3:o:microsoft:windows_7:-:sp1
    cpe:2.3:o:microsoft:windows_7:-:sp1
  • Microsoft Windows Server 2003 Service Pack 2
    cpe:2.3:o:microsoft:windows_server_2003:-:sp2
  • Microsoft Windows Server 2008
    cpe:2.3:o:microsoft:windows_server_2008
  • Microsoft Windows Server 2008 Service Pack 2
    cpe:2.3:o:microsoft:windows_server_2008:-:sp2
  • Microsoft Windows Server 2008 R2 on Itanium
    cpe:2.3:o:microsoft:windows_server_2008:r2:-:-:-:-:-:itanium
  • Microsoft Windows Server 2008 R2 on x64
    cpe:2.3:o:microsoft:windows_server_2008:r2:-:-:-:-:-:x64
  • cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:-:-:-:-:itanium
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:-:-:-:-:itanium
  • cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:-:-:-:-:x64
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:-:-:-:-:x64
  • Microsoft Windows Vista Service Pack 1 (initial release)
    cpe:2.3:o:microsoft:windows_vista:-:sp1
  • cpe:2.3:o:microsoft:windows_vista:-:sp1:-:-:-:-:x64
    cpe:2.3:o:microsoft:windows_vista:-:sp1:-:-:-:-:x64
  • Microsoft Windows Vista Service Pack 2
    cpe:2.3:o:microsoft:windows_vista:-:sp2
  • cpe:2.3:o:microsoft:windows_vista:-:sp2:-:-:-:-:x64
    cpe:2.3:o:microsoft:windows_vista:-:sp2:-:-:-:-:x64
  • cpe:2.3:o:microsoft:windows_xp:-:sp2:-:-:-:-:x64
    cpe:2.3:o:microsoft:windows_xp:-:sp2:-:-:-:-:x64
  • Microsoft Windows XP Service Pack 3
    cpe:2.3:o:microsoft:windows_xp:-:sp3
  • cpe:2.3:a:avaya:agent_access
    cpe:2.3:a:avaya:agent_access
  • cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0
    cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0
  • Avaya Basic Call Management System Reporting Desktop
    cpe:2.3:a:avaya:basic_call_management_system_reporting_desktop
  • cpe:2.3:a:avaya:call_management_server_supervisor
    cpe:2.3:a:avaya:call_management_server_supervisor
  • cpe:2.3:a:avaya:callvisor_asai_lan
    cpe:2.3:a:avaya:callvisor_asai_lan
  • Avaya Computer Telephony
    cpe:2.3:a:avaya:computer_telephony
  • cpe:2.3:a:avaya:contact_center_express
    cpe:2.3:a:avaya:contact_center_express
  • cpe:2.3:a:avaya:customer_interaction_express
    cpe:2.3:a:avaya:customer_interaction_express
  • Avaya Enterprise Manager
    cpe:2.3:a:avaya:enterprise_manager
  • Avaya Integrated Management
    cpe:2.3:a:avaya:integrated_management
  • Avaya Interaction Center
    cpe:2.3:a:avaya:interaction_center
  • Avaya IP Agent
    cpe:2.3:a:avaya:ip_agent
  • cpe:2.3:a:avaya:ip_softphone
    cpe:2.3:a:avaya:ip_softphone
  • Avaya Network Reporting
    cpe:2.3:a:avaya:network_reporting
  • cpe:2.3:a:avaya:octelaccess%28r%29_server
    cpe:2.3:a:avaya:octelaccess%28r%29_server
  • cpe:2.3:a:avaya:octeldesignertm
    cpe:2.3:a:avaya:octeldesignertm
  • Avaya Operational Analyst
    cpe:2.3:a:avaya:operational_analyst
  • cpe:2.3:a:avaya:outbound_contact_management
    cpe:2.3:a:avaya:outbound_contact_management
  • Avaya Speech Access
    cpe:2.3:a:avaya:speech_access
  • Avaya Unified Communication Center
    cpe:2.3:a:avaya:unified_communication_center
  • cpe:2.3:a:avaya:unified_messenger_%28r%29
    cpe:2.3:a:avaya:unified_messenger_%28r%29
  • Avaya Visual Messenger TM
    cpe:2.3:a:avaya:visual_messenger_tm
  • Avaya Visual Vector Client
    cpe:2.3:a:avaya:visual_vector_client
  • cpe:2.3:a:avaya:vpnmanagertm_console
    cpe:2.3:a:avaya:vpnmanagertm_console
  • Avaya Web Messenger
    cpe:2.3:a:avaya:web_messenger
CVSS
Base: 7.2 (as of 14-04-2011 - 12:02)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
msbulletin via4
bulletin_id MS11-034
bulletin_url
date 2011-04-12T00:00:00
impact Elevation of Privilege
knowledgebase_id 2506223
knowledgebase_url
severity Important
title Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS11-034.NASL
description The remote host is running a version of the Windows kernel that is affected by the following types of vulnerabilities : - Several use-after-free vulnerabilities exist due to the way that Windows kernel-mode drivers manage kernel-mode driver objects. (CVE-2011-0662, CVE-2011-0665, CVE-2011-0666, CVE-2011-0667, CVE-2011-0670, CVE-2011-0671, CVE-2011-0672, CVE-2011-0674, CVE-2011-0675, CVE-2011-1234, CVE-2011-1235, CVE-2011-1236, CVE-2011-1237, CVE-2011-1238, CVE-2011-1239, CVE-2011-1240, CVE-2011-1241, CVE-2011-1242) - Several NULL pointer de-reference vulnerabilities exist due to the way that Windows kernel-mode drivers manage pointers to kernel-mode driver objects. (CVE-2011-0673, CVE-2011-0676, CVE-2011-0677, CVE-2011-1225, CVE-2011-1226, CVE-2011-1227, CVE-2011-1228, CVE-2011-1229, CVE-2011-1230, CVE-2011-1231, CVE-2011-1232, CVE-2011-1233) An attacker with local access to the affected system can exploit these issues to execute arbitrary code in kernel mode and take complete control of the affected system.
last seen 2019-02-21
modified 2018-11-15
plugin id 53391
published 2011-04-13
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=53391
title MS11-034: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2506223)
oval via4
accepted 2014-03-03T04:00:30.613-05:00
class vulnerability
contributors
  • name Josh Turpin
    organization Symantec Corporation
  • name Dragos Prisaca
    organization Symantec Corporation
  • name Sharath S
    organization SecPod Technologies
  • name Maria Mikhno
    organization ALTX-SOFT
definition_extensions
  • comment Microsoft Windows XP (x86) SP3 is installed
    oval oval:org.mitre.oval:def:5631
  • comment Microsoft Windows XP x64 Edition SP2 is installed
    oval oval:org.mitre.oval:def:4193
  • comment Microsoft Windows Server 2003 SP2 (x64) is installed
    oval oval:org.mitre.oval:def:2161
  • comment Microsoft Windows Server 2003 SP2 (x86) is installed
    oval oval:org.mitre.oval:def:1935
  • comment Microsoft Windows Server 2003 (ia64) SP2 is installed
    oval oval:org.mitre.oval:def:1442
  • comment Microsoft Windows Vista (32-bit) Service Pack 1 is installed
    oval oval:org.mitre.oval:def:4873
  • comment Microsoft Windows Server 2008 (32-bit) is installed
    oval oval:org.mitre.oval:def:4870
  • comment Microsoft Windows Vista x64 Edition Service Pack 1 is installed
    oval oval:org.mitre.oval:def:5254
  • comment Microsoft Windows Server 2008 (64-bit) is installed
    oval oval:org.mitre.oval:def:5356
  • comment Microsoft Windows Server 2008 (ia-64) is installed
    oval oval:org.mitre.oval:def:5667
  • comment Microsoft Windows Vista (32-bit) Service Pack 2 is installed
    oval oval:org.mitre.oval:def:6124
  • comment Microsoft Windows Vista x64 Edition Service Pack 2 is installed
    oval oval:org.mitre.oval:def:5594
  • comment Microsoft Windows Server 2008 (32-bit) Service Pack 2 is installed
    oval oval:org.mitre.oval:def:5653
  • comment Microsoft Windows Server 2008 x64 Edition Service Pack 2 is installed
    oval oval:org.mitre.oval:def:6216
  • comment Microsoft Windows Server 2008 Itanium-Based Edition Service Pack 2 is installed
    oval oval:org.mitre.oval:def:6150
  • comment Microsoft Windows 7 (32-bit) is installed
    oval oval:org.mitre.oval:def:6165
  • comment Microsoft Windows 7 x64 Edition is installed
    oval oval:org.mitre.oval:def:5950
  • comment Microsoft Windows Server 2008 R2 x64 Edition is installed
    oval oval:org.mitre.oval:def:6438
  • comment Microsoft Windows Server 2008 R2 Itanium-Based Edition is installed
    oval oval:org.mitre.oval:def:5954
  • comment Microsoft Windows 7 (32-bit) Service Pack 1 Release Candidate is installed
    oval oval:org.mitre.oval:def:12295
  • comment Microsoft Windows 7 x64 Service Pack 1 Release Candidate is installed
    oval oval:org.mitre.oval:def:12435
  • comment Microsoft Windows 7 (32-bit) Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12292
  • comment Microsoft Windows 7 x64 Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12627
  • comment Microsoft Windows Server 2008 R2 x64 Service Pack 1 Release Candidate is installed
    oval oval:org.mitre.oval:def:11590
  • comment Microsoft Windows Server 2008 R2 Itanium-Based Edition Service Pack 1 Release Candidate is installed
    oval oval:org.mitre.oval:def:12159
  • comment Microsoft Windows Server 2008 R2 x64 Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12567
  • comment Microsoft Windows Server 2008 R2 Itanium-Based Edition Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12583
description win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
family windows
id oval:org.mitre.oval:def:12503
status accepted
submitted 2011-02-09T13:00:00
title Win32k Null Pointer De-reference Vulnerability (CVE-2011-1229)
version 75
refmap via4
bid 47229
cert TA11-102A
confirm http://support.avaya.com/css/P8/documents/100133352
misc http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx
ms MS11-034
osvdb 71735
sectrack 1025345
secunia 44156
vupen ADV-2011-0952
xf mswin-win32k-var17-priv-escalation(66411)
Last major update 04-10-2011 - 22:53
Published 13-04-2011 - 16:26
Last modified 27-02-2019 - 20:32
Back to Top