Vulnerability Details : CVE-2011-1229
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
Vulnerability category: Memory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2011-1229
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 8 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-1229
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2011-1229
-
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1229
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/66411
Microsoft Windows kernel-mode driver (win32k.sys) variant 17 privilege escalation CVE-2011-1229 Vulnerability ReportVDB Entry
-
http://www.us-cert.gov/cas/techalerts/TA11-102A.html
Microsoft Updates for Multiple Vulnerabilities | CISAThird Party Advisory;US Government Resource
-
http://www.securitytracker.com/id?1025345
Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges - SecurityTrackerThird Party Advisory;VDB Entry
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034
Microsoft Security Bulletin MS11-034 - Important | Microsoft DocsPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/47229
Microsoft Windows Kernel 'Win32k.sys' (CVE-2011-1229) Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503
Repository / Oval RepositoryThird Party Advisory
-
http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx
MS11-034: Addressing vulnerabilities in the win32k subsystem – Microsoft Security Response CenterVendor Advisory
-
http://support.avaya.com/css/P8/documents/100133352
ASA-2011-110 MS11-034 (2506223)Third Party Advisory
Products affected by CVE-2011-1229
- cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
- cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:meeting_exchange:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:agent_access:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:basic_call_management_system_reporting_desktop:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:call_management_server_supervisor:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:callpilot:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:callvisor_asai_lan:*:*:*:*:*:*:*:*
- Avaya » Communication Server 1000 Telephony ManagerVersions from including (>=) 3.0.0 and up to, including, (<=) 4.0.0cpe:2.3:a:avaya:communication_server_1000_telephony_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:computer_telephony:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:contact_center_express:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:customer_interaction_express:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:enterprise_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:interaction_center:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:ip_agent:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:ip_softphone:*:*:*:*:*:*:*:*
- Avaya » Messaging Application ServerVersions from including (>=) 4.0.x and up to, including, (<=) 5.2.xcpe:2.3:a:avaya:messaging_application_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:network_reporting:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:octelaccess_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:octeldesigner:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:operational_analyst:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:outbound_contact_management:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:speech_access:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:unified_communication_center:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:unified_messenger:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:visual_messenger:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:visual_vector_client:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:vpnmanager_console:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:web_messenger:*:*:*:*:*:*:*:*