2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2011-1974" ,
"sourceIdentifier" : "secure@microsoft.com" ,
"published" : "2011-08-10T21:55:01.890" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T01:27:24.897" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "NDISTAPI.sys in the NDISTAPI driver in Remote Access Service (RAS) in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka \"NDISTAPI Elevation of Privilege Vulnerability.\""
} ,
{
"lang" : "es" ,
"value" : "NDISTAPI.sys del controlador NDISTAPI en el servicio de acceso remoto (RAS) de Microsoft Windows XP SP2 y SP3 y Windows Server 2003 SP2 no valida apropiadamente la entrada de modo usuario, lo que permite a usuarios locales escalar privilegios a trav\u00e9s de una aplicaci\u00f3n modificada. Tambi\u00e9n conocida como \"vulnerabilidad de escalado de privlegios NDISTAPI\"."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.2 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*" ,
"matchCriteriaId" : "2978BF86-5A1A-438E-B81F-F360D0E30C9C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*" ,
"matchCriteriaId" : "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ,
"matchCriteriaId" : "CE477A73-4EE4-41E9-8694-5A3D5DC88656"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ,
"matchCriteriaId" : "FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.securityfocus.com/bid/48996" ,
"source" : "secure@microsoft.com"
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA11-221A.html" ,
"source" : "secure@microsoft.com" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-062" ,
"source" : "secure@microsoft.com"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12912" ,
"source" : "secure@microsoft.com"
} ,
{
"url" : "https://www.exploit-db.com/exploits/40627/" ,
"source" : "secure@microsoft.com"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://www.securityfocus.com/bid/48996" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA11-221A.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-062" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12912" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.exploit-db.com/exploits/40627/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}