mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 17:51:17 +00:00
373 lines
14 KiB
JSON
373 lines
14 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2011-1229",
|
||
|
"sourceIdentifier": "secure@microsoft.com",
|
||
|
"published": "2011-04-13T20:26:25.250",
|
||
|
"lastModified": "2021-03-26T18:47:06.177",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other \"Vulnerability Type 2\" CVEs listed in MS11-034, aka \"Win32k Null Pointer De-reference Vulnerability.\""
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Vulneravilidad de desreferencia a puntero nulo en win32k.sys en el controlador kernel-modeen en Microsoft Windows XP SP2 ySP3, Windows Server 2003 SP2, Windows Vista SP1 y SP2, Windows Server 2008 Gold, SP2, R2, y R2 SP1, y Windows 7 Gold y SP1, permite a usuarios locales obtener privilegios a trav\u00e9s de aplicaciones manipuladas lanzan un desreferencia a puntero nulo. Vulnerabilidad distinta de \"Vulnerabilidad tipo 2\" listada en los CVEs en MS11-034, tambi\u00e9n conocida como \"Win32k Null Pointer De-reference Vulnerability.\""
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
|
"accessVector": "LOCAL",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "COMPLETE",
|
||
|
"integrityImpact": "COMPLETE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 7.2
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 10.0,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-476"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3C0C7D2B-0AA5-4E82-B58B-2668A0EAC2E9"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*",
|
||
|
"matchCriteriaId": "B20DD263-5A62-4CB1-BD47-D1F9A6C67E08"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*",
|
||
|
"matchCriteriaId": "B7674920-AE12-4A25-BE57-34AEDDA74D76"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
|
||
|
"matchCriteriaId": "B320A104-9037-487E-BC9A-62B4A6B49FD0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||
|
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*",
|
||
|
"matchCriteriaId": "7211B5C5-6B6E-4A33-88BC-1D64CD684204"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:x64:*",
|
||
|
"matchCriteriaId": "6FF85ADB-8F36-424D-9F4A-BD357304CE66"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*",
|
||
|
"matchCriteriaId": "BADB0479-3E0E-4326-B568-9DBDCACF0B5E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:agent_access:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "41A2A343-6084-4123-80AB-99508101821B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "34F74A4C-8A30-4CE7-81CB-85248313E78F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:basic_call_management_system_reporting_desktop:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E47123FC-A4C4-4806-A708-6F31455FA030"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:call_management_server_supervisor:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C0697163-0E8F-40DF-BA37-5506EFF383F9"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:callpilot:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "4.0.x",
|
||
|
"versionEndIncluding": "5.0.x",
|
||
|
"matchCriteriaId": "BB19CA9F-6272-4E9C-A986-6ED5B199894A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:callvisor_asai_lan:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B145E412-2D7B-4961-94CA-1BEE72D93067"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:communication_server_1000_telephony_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "3.0.0",
|
||
|
"versionEndIncluding": "4.0.0",
|
||
|
"matchCriteriaId": "AB0E8DB4-973E-4A92-AFC0-809EF9612020"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:computer_telephony:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "2C7CB383-65EB-4B90-A987-1BEBA6F0804A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:contact_center_express:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0A5BAB1E-B4CA-465B-9305-EB9A4B60A18D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:customer_interaction_express:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "456FCAC1-3789-4C51-98EB-31C3502A2CBD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:enterprise_manager:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6D010DC3-3263-4D74-80AB-29AF09159346"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D12D6986-429E-4152-A6E5-4CC1FB9556D3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:interaction_center:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4A9CC958-7300-4CEF-95BE-4DE004DCFE45"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:ip_agent:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F01ED7E7-0B36-407E-B0A5-3878A269BCB4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:ip_softphone:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B63252E0-FB28-4854-81D5-DF654F1758F7"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:meeting_exchange:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "5.0.0",
|
||
|
"versionEndIncluding": "5.2.0",
|
||
|
"matchCriteriaId": "DBE28C39-5C7A-46A8-9718-33C0EB579C66"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:messaging_application_server:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "4.0.x",
|
||
|
"versionEndIncluding": "5.2.x",
|
||
|
"matchCriteriaId": "1FC25636-CED5-4D7C-866E-0E98E0838EDE"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:network_reporting:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "84EB1E01-DB96-402F-AFD5-C7471898798A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:octelaccess_server:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6E53EA20-1C16-4990-B6AB-5DB152BBB663"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:octeldesigner:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6A2DED01-5279-45E6-B2F9-043AE42C2014"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:operational_analyst:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3F048BA5-841B-4F42-A46F-269D503B4261"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:outbound_contact_management:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "809622B0-E540-4D53-881C-CC7452742065"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:speech_access:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F3587A97-16EA-4E58-BC01-CE37BA2FEE0E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:unified_communication_center:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "963D3743-3FBA-4AA4-8FA0-0D567E5DED71"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:unified_messenger:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "2635C6CE-082B-4CE1-87B5-38C11D33A9A9"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:visual_messenger:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FA613FC6-09A1-4873-9481-E00571A64FA3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:visual_vector_client:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3045D507-ECEE-49F4-8080-B440A1B97240"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:vpnmanager_console:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DEB7AC00-A06F-4A4D-A173-704F1D4A6709"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:avaya:web_messenger:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D520A8CD-CA81-4CA4-85FE-C83E5DE541F5"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
|
||
|
"source": "secure@microsoft.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://support.avaya.com/css/P8/documents/100133352",
|
||
|
"source": "secure@microsoft.com",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/47229",
|
||
|
"source": "secure@microsoft.com",
|
||
|
"tags": [
|
||
|
"Third Party Advisory",
|
||
|
"VDB Entry"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securitytracker.com/id?1025345",
|
||
|
"source": "secure@microsoft.com",
|
||
|
"tags": [
|
||
|
"Third Party Advisory",
|
||
|
"VDB Entry"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html",
|
||
|
"source": "secure@microsoft.com",
|
||
|
"tags": [
|
||
|
"Third Party Advisory",
|
||
|
"US Government Resource"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034",
|
||
|
"source": "secure@microsoft.com",
|
||
|
"tags": [
|
||
|
"Patch",
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411",
|
||
|
"source": "secure@microsoft.com",
|
||
|
"tags": [
|
||
|
"VDB Entry"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503",
|
||
|
"source": "secure@microsoft.com",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|