CVE-2011-1229

Current Description

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."

Evaluator Description

Per: http://cwe.mitre.org/data/definitions/476.html'CWE-476: NULL Pointer Dereference'

Basic Data

PublishedApril 13, 2011
Last ModifiedFebruary 28, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSMicrosoftWindows 2003 Server-sp2******
    2.3OSMicrosoftWindows 7-*******
    2.3OSMicrosoftWindows 7-sp1******
    2.3OSMicrosoftWindows Server 2003-sp2******
    2.3OSMicrosoftWindows Server 2008-*******
    2.3OSMicrosoftWindows Server 2008-sp2******
    2.3OSMicrosoftWindows Server 2008r2*****itanium*
    2.3OSMicrosoftWindows Server 2008r2*****x64*
    2.3OSMicrosoftWindows Server 2008r2sp1****itanium*
    2.3OSMicrosoftWindows Server 2008r2sp1****x64*
    2.3OSMicrosoftWindows Vista-sp1******
    2.3OSMicrosoftWindows Vista-sp1****x64*
    2.3OSMicrosoftWindows Vista-sp2******
    2.3OSMicrosoftWindows Vista-sp2****x64*
    2.3OSMicrosoftWindows Xp-sp2****x64*
    2.3OSMicrosoftWindows Xp-sp3******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationAvayaAgent Access********
    2.3ApplicationAvayaAura Conferencing Standard Edition6.0.0*******
    2.3ApplicationAvayaBasic Call Management System Reporting Desktop********
    2.3ApplicationAvayaCall Management Server Supervisor********
    2.3ApplicationAvayaCallpilot********4.0.x5.0.x
    2.3ApplicationAvayaCallvisor Asai Lan********
    2.3ApplicationAvayaCommunication Server 1000 Telephony Manager********3.0.04.0.0
    2.3ApplicationAvayaComputer Telephony********
    2.3ApplicationAvayaContact Center Express********
    2.3ApplicationAvayaCustomer Interaction Express********
    2.3ApplicationAvayaEnterprise Manager********
    2.3ApplicationAvayaIntegrated Management********
    2.3ApplicationAvayaInteraction Center********
    2.3ApplicationAvayaIp Agent********
    2.3ApplicationAvayaIp Softphone********
    2.3ApplicationAvayaMeeting Exchange********5.0.05.2.0
    2.3ApplicationAvayaMessaging Application Server********4.0.x5.2.x
    2.3ApplicationAvayaNetwork Reporting********
    2.3ApplicationAvayaOctelaccess(r) Server********
    2.3ApplicationAvayaOcteldesignertm********
    2.3ApplicationAvayaOperational Analyst********
    2.3ApplicationAvayaOutbound Contact Management********
    2.3ApplicationAvayaSpeech Access********
    2.3ApplicationAvayaUnified Communication Center********
    2.3ApplicationAvayaUnified Messenger (r)********
    2.3ApplicationAvayaVisual Messenger Tm********
    2.3ApplicationAvayaVisual Vector Client********
    2.3ApplicationAvayaVpnmanagertm Console********
    2.3ApplicationAvayaWeb Messenger********

Vulnerable Software List

VendorProductVersions
Microsoft Windows Xp -
Microsoft Windows 7 -
Microsoft Windows Vista -
Microsoft Windows 2003 Server -
Microsoft Windows Server 2003 -
Microsoft Windows Server 2008 -, r2
Avaya Messaging Application Server *
Avaya Network Reporting *
Avaya Octelaccess(r) Server *
Avaya Octeldesignertm *
Avaya Operational Analyst *
Avaya Outbound Contact Management *
Avaya Speech Access *
Avaya Unified Communication Center *
Avaya Unified Messenger (r) *
Avaya Visual Messenger Tm *
Avaya Visual Vector Client *
Avaya Vpnmanagertm Console *
Avaya Web Messenger *
Avaya Callpilot *
Avaya Integrated Management *
Avaya Enterprise Manager *
Avaya Agent Access *
Avaya Aura Conferencing Standard Edition 6.0.0
Avaya Basic Call Management System Reporting Desktop *
Avaya Call Management Server Supervisor *
Avaya Callvisor Asai Lan *
Avaya Communication Server 1000 Telephony Manager *
Avaya Computer Telephony *
Avaya Contact Center Express *
Avaya Customer Interaction Express *
Avaya Interaction Center *
Avaya Ip Agent *
Avaya Ip Softphone *
Avaya Meeting Exchange *

References

NameSourceURLTags
http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspxhttp://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-MISCVendor Advisory
71735http://osvdb.org/71735OSVDBBroken Link
44156http://secunia.com/advisories/44156SECUNIAThird Party Advisory
http://support.avaya.com/css/P8/documents/100133352http://support.avaya.com/css/P8/documents/100133352CONFIRMThird Party Advisory
47229http://www.securityfocus.com/bid/47229BIDThird Party Advisory VDB Entry
1025345http://www.securitytracker.com/id?1025345SECTRACKThird Party Advisory VDB Entry
TA11-102Ahttp://www.us-cert.gov/cas/techalerts/TA11-102A.htmlCERTThird Party Advisory US Government Resource
ADV-2011-0952http://www.vupen.com/english/advisories/2011/0952VUPENBroken Link
MS11-034https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034MSPatch Vendor Advisory
mswin-win32k-var17-priv-escalation(66411)https://exchange.xforce.ibmcloud.com/vulnerabilities/66411XFVDB Entry
oval:org.mitre.oval:def:12503https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503OVALThird Party Advisory