ID CVE-2011-1229
Summary win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability." Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
    cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
  • cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
  • cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
  • cpe:2.3:a:avaya:agent_access:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:agent_access:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:basic_call_management_system_reporting_desktop:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:basic_call_management_system_reporting_desktop:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:call_management_server_supervisor:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:call_management_server_supervisor:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:callpilot:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:callpilot:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:callvisor_asai_lan:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:callvisor_asai_lan:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:communication_server_1000_telephony_manager:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:communication_server_1000_telephony_manager:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:computer_telephony:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:computer_telephony:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:contact_center_express:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:contact_center_express:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:customer_interaction_express:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:customer_interaction_express:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:enterprise_manager:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:enterprise_manager:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:interaction_center:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:interaction_center:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:ip_agent:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:ip_agent:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:ip_softphone:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:ip_softphone:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:meeting_exchange:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:meeting_exchange:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:messaging_application_server:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:messaging_application_server:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:network_reporting:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:network_reporting:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:octelaccess\(r\)_server:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:octelaccess\(r\)_server:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:octeldesignertm:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:octeldesignertm:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:operational_analyst:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:operational_analyst:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:outbound_contact_management:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:outbound_contact_management:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:speech_access:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:speech_access:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:unified_communication_center:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:unified_communication_center:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:unified_messenger_\(r\):*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:unified_messenger_\(r\):*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:visual_messenger_tm:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:visual_messenger_tm:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:visual_vector_client:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:visual_vector_client:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:vpnmanagertm_console:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:vpnmanagertm_console:*:*:*:*:*:*:*:*
  • cpe:2.3:a:avaya:web_messenger:*:*:*:*:*:*:*:*
    cpe:2.3:a:avaya:web_messenger:*:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 28-02-2019 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
oval via4
accepted 2014-03-03T04:00:30.613-05:00
class vulnerability
contributors
  • name Josh Turpin
    organization Symantec Corporation
  • name Dragos Prisaca
    organization Symantec Corporation
  • name Sharath S
    organization SecPod Technologies
  • name Maria Mikhno
    organization ALTX-SOFT
definition_extensions
  • comment Microsoft Windows XP (x86) SP3 is installed
    oval oval:org.mitre.oval:def:5631
  • comment Microsoft Windows XP x64 Edition SP2 is installed
    oval oval:org.mitre.oval:def:4193
  • comment Microsoft Windows Server 2003 SP2 (x64) is installed
    oval oval:org.mitre.oval:def:2161
  • comment Microsoft Windows Server 2003 SP2 (x86) is installed
    oval oval:org.mitre.oval:def:1935
  • comment Microsoft Windows Server 2003 (ia64) SP2 is installed
    oval oval:org.mitre.oval:def:1442
  • comment Microsoft Windows Vista (32-bit) Service Pack 1 is installed
    oval oval:org.mitre.oval:def:4873
  • comment Microsoft Windows Server 2008 (32-bit) is installed
    oval oval:org.mitre.oval:def:4870
  • comment Microsoft Windows Vista x64 Edition Service Pack 1 is installed
    oval oval:org.mitre.oval:def:5254
  • comment Microsoft Windows Server 2008 (64-bit) is installed
    oval oval:org.mitre.oval:def:5356
  • comment Microsoft Windows Server 2008 (ia-64) is installed
    oval oval:org.mitre.oval:def:5667
  • comment Microsoft Windows Vista (32-bit) Service Pack 2 is installed
    oval oval:org.mitre.oval:def:6124
  • comment Microsoft Windows Vista x64 Edition Service Pack 2 is installed
    oval oval:org.mitre.oval:def:5594
  • comment Microsoft Windows Server 2008 (32-bit) Service Pack 2 is installed
    oval oval:org.mitre.oval:def:5653
  • comment Microsoft Windows Server 2008 x64 Edition Service Pack 2 is installed
    oval oval:org.mitre.oval:def:6216
  • comment Microsoft Windows Server 2008 Itanium-Based Edition Service Pack 2 is installed
    oval oval:org.mitre.oval:def:6150
  • comment Microsoft Windows 7 (32-bit) is installed
    oval oval:org.mitre.oval:def:6165
  • comment Microsoft Windows 7 x64 Edition is installed
    oval oval:org.mitre.oval:def:5950
  • comment Microsoft Windows Server 2008 R2 x64 Edition is installed
    oval oval:org.mitre.oval:def:6438
  • comment Microsoft Windows Server 2008 R2 Itanium-Based Edition is installed
    oval oval:org.mitre.oval:def:5954
  • comment Microsoft Windows 7 (32-bit) Service Pack 1 Release Candidate is installed
    oval oval:org.mitre.oval:def:12295
  • comment Microsoft Windows 7 x64 Service Pack 1 Release Candidate is installed
    oval oval:org.mitre.oval:def:12435
  • comment Microsoft Windows 7 (32-bit) Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12292
  • comment Microsoft Windows 7 x64 Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12627
  • comment Microsoft Windows Server 2008 R2 x64 Service Pack 1 Release Candidate is installed
    oval oval:org.mitre.oval:def:11590
  • comment Microsoft Windows Server 2008 R2 Itanium-Based Edition Service Pack 1 Release Candidate is installed
    oval oval:org.mitre.oval:def:12159
  • comment Microsoft Windows Server 2008 R2 x64 Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12567
  • comment Microsoft Windows Server 2008 R2 Itanium-Based Edition Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12583
description win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
family windows
id oval:org.mitre.oval:def:12503
status accepted
submitted 2011-02-09T13:00:00
title Win32k Null Pointer De-reference Vulnerability (CVE-2011-1229)
version 75
refmap via4
bid 47229
cert TA11-102A
confirm http://support.avaya.com/css/P8/documents/100133352
misc http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx
ms MS11-034
osvdb 71735
sectrack 1025345
secunia 44156
vupen ADV-2011-0952
xf mswin-win32k-var17-priv-escalation(66411)
Last major update 28-02-2019 - 01:32
Published 13-04-2011 - 20:26
Back to Top