CVE-2011-1229 : Detail

CVE-2011-1229

Memory Corruption
0.31%V3
Local
2011-04-13
18h07 +00:00
2018-10-12
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Microsoft>>Windows_2003_server >> Version -

Microsoft>>Windows_7 >> Version -

Microsoft>>Windows_7 >> Version -

Microsoft>>Windows_server_2003 >> Version -

Microsoft>>Windows_server_2008 >> Version -

Microsoft>>Windows_server_2008 >> Version -

Microsoft>>Windows_server_2008 >> Version r2

Microsoft>>Windows_server_2008 >> Version r2

Microsoft>>Windows_server_2008 >> Version r2

Microsoft>>Windows_server_2008 >> Version r2

Microsoft>>Windows_vista >> Version -

Microsoft>>Windows_vista >> Version -

Microsoft>>Windows_vista >> Version -

Microsoft>>Windows_vista >> Version -

Microsoft>>Windows_xp >> Version -

Microsoft>>Windows_xp >> Version -

Configuraton 0

Avaya>>Agent_access >> Version *

Avaya>>Aura_conferencing_standard_edition >> Version 6.0.0

Avaya>>Basic_call_management_system_reporting_desktop >> Version *

Avaya>>Call_management_server_supervisor >> Version *

Avaya>>Callpilot >> Version From (including) 4.0.x To (including) 5.0.x

Avaya>>Callvisor_asai_lan >> Version *

Avaya>>Communication_server_1000_telephony_manager >> Version From (including) 3.0.0 To (including) 4.0.0

Avaya>>Computer_telephony >> Version *

Avaya>>Contact_center_express >> Version *

Avaya>>Customer_interaction_express >> Version *

Avaya>>Enterprise_manager >> Version *

Avaya>>Integrated_management >> Version *

Avaya>>Interaction_center >> Version *

Avaya>>Ip_agent >> Version *

Avaya>>Ip_softphone >> Version *

Avaya>>Meeting_exchange >> Version From (including) 5.0.0 To (including) 5.2.0

Avaya>>Messaging_application_server >> Version From (including) 4.0.x To (including) 5.2.x

Avaya>>Network_reporting >> Version *

Avaya>>Octelaccess_server >> Version *

Avaya>>Octeldesigner >> Version *

Avaya>>Operational_analyst >> Version *

Avaya>>Outbound_contact_management >> Version *

Avaya>>Speech_access >> Version *

Avaya>>Unified_communication_center >> Version *

Avaya>>Unified_messenger >> Version *

Avaya>>Visual_messenger >> Version *

Avaya>>Visual_vector_client >> Version *

Avaya>>Vpnmanager_console >> Version *

Avaya>>Web_messenger >> Version *

References

http://www.securityfocus.com/bid/47229
Tags : vdb-entry, x_refsource_BID
http://www.us-cert.gov/cas/techalerts/TA11-102A.html
Tags : third-party-advisory, x_refsource_CERT
http://www.vupen.com/english/advisories/2011/0952
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/44156
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1025345
Tags : vdb-entry, x_refsource_SECTRACK
http://osvdb.org/71735
Tags : vdb-entry, x_refsource_OSVDB