CVE-2011-1229 (CNNVD-201104-132)
HIGH
中文标题:
Microsoft Windows多个平台内核模式驱动程序Win32k空指针解引用漏洞
英文标题:
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, ...
CVSS分数:
7.2
发布时间:
2011-04-13 20:07:00
漏洞类型:
代码问题
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 由于Windows内核模式驱动程序管理至内核模式驱动程序对象的指针的方式而存在特权提升漏洞。成功利用此漏洞的攻击者可以运行内核模式中的任意代码。攻击者可随后安装程序;查看、更改或删除数据;或者创建拥有完全用户权限的新帐户。
英文描述:
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
CWE类型:
CWE-476
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| microsoft | windows_2003_server | - | - | - |
cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*
|
| microsoft | windows_7 | - | - | - |
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
|
| microsoft | windows_server_2003 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
|
| microsoft | windows_server_2008 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
|
| microsoft | windows_server_2008 | r2 | - | - |
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
|
| microsoft | windows_vista | - | - | - |
cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
|
| microsoft | windows_xp | - | - | - |
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*
|
| avaya | agent_access | * | - | - |
cpe:2.3:a:avaya:agent_access:*:*:*:*:*:*:*:*
|
| avaya | aura_conferencing_standard_edition | 6.0.0 | - | - |
cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0:*:*:*:*:*:*:*
|
| avaya | basic_call_management_system_reporting_desktop | * | - | - |
cpe:2.3:a:avaya:basic_call_management_system_reporting_desktop:*:*:*:*:*:*:*:*
|
| avaya | call_management_server_supervisor | * | - | - |
cpe:2.3:a:avaya:call_management_server_supervisor:*:*:*:*:*:*:*:*
|
| avaya | callpilot | * | - | - |
cpe:2.3:a:avaya:callpilot:*:*:*:*:*:*:*:*
|
| avaya | callvisor_asai_lan | * | - | - |
cpe:2.3:a:avaya:callvisor_asai_lan:*:*:*:*:*:*:*:*
|
| avaya | communication_server_1000_telephony_manager | * | - | - |
cpe:2.3:a:avaya:communication_server_1000_telephony_manager:*:*:*:*:*:*:*:*
|
| avaya | computer_telephony | * | - | - |
cpe:2.3:a:avaya:computer_telephony:*:*:*:*:*:*:*:*
|
| avaya | contact_center_express | * | - | - |
cpe:2.3:a:avaya:contact_center_express:*:*:*:*:*:*:*:*
|
| avaya | customer_interaction_express | * | - | - |
cpe:2.3:a:avaya:customer_interaction_express:*:*:*:*:*:*:*:*
|
| avaya | enterprise_manager | * | - | - |
cpe:2.3:a:avaya:enterprise_manager:*:*:*:*:*:*:*:*
|
| avaya | integrated_management | * | - | - |
cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*
|
| avaya | interaction_center | * | - | - |
cpe:2.3:a:avaya:interaction_center:*:*:*:*:*:*:*:*
|
| avaya | ip_agent | * | - | - |
cpe:2.3:a:avaya:ip_agent:*:*:*:*:*:*:*:*
|
| avaya | ip_softphone | * | - | - |
cpe:2.3:a:avaya:ip_softphone:*:*:*:*:*:*:*:*
|
| avaya | meeting_exchange | * | - | - |
cpe:2.3:a:avaya:meeting_exchange:*:*:*:*:*:*:*:*
|
| avaya | messaging_application_server | * | - | - |
cpe:2.3:a:avaya:messaging_application_server:*:*:*:*:*:*:*:*
|
| avaya | network_reporting | * | - | - |
cpe:2.3:a:avaya:network_reporting:*:*:*:*:*:*:*:*
|
| avaya | octelaccess_server | * | - | - |
cpe:2.3:a:avaya:octelaccess_server:*:*:*:*:*:*:*:*
|
| avaya | octeldesigner | * | - | - |
cpe:2.3:a:avaya:octeldesigner:*:*:*:*:*:*:*:*
|
| avaya | operational_analyst | * | - | - |
cpe:2.3:a:avaya:operational_analyst:*:*:*:*:*:*:*:*
|
| avaya | outbound_contact_management | * | - | - |
cpe:2.3:a:avaya:outbound_contact_management:*:*:*:*:*:*:*:*
|
| avaya | speech_access | * | - | - |
cpe:2.3:a:avaya:speech_access:*:*:*:*:*:*:*:*
|
| avaya | unified_communication_center | * | - | - |
cpe:2.3:a:avaya:unified_communication_center:*:*:*:*:*:*:*:*
|
| avaya | unified_messenger | * | - | - |
cpe:2.3:a:avaya:unified_messenger:*:*:*:*:*:*:*:*
|
| avaya | visual_messenger | * | - | - |
cpe:2.3:a:avaya:visual_messenger:*:*:*:*:*:*:*:*
|
| avaya | visual_vector_client | * | - | - |
cpe:2.3:a:avaya:visual_vector_client:*:*:*:*:*:*:*:*
|
| avaya | vpnmanager_console | * | - | - |
cpe:2.3:a:avaya:vpnmanager_console:*:*:*:*:*:*:*:*
|
| avaya | web_messenger | * | - | - |
cpe:2.3:a:avaya:web_messenger:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
47229
vdb-entry
cve.org
访问
cve.org
TA11-102A
third-party-advisory
cve.org
访问
cve.org
mswin-win32k-var17-priv-escalation(66411)
vdb-entry
cve.org
访问
cve.org
MS11-034
vendor-advisory
cve.org
访问
cve.org
ADV-2011-0952
vdb-entry
cve.org
访问
cve.org
oval:org.mitre.oval:def:12503
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
44156
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
1025345
vdb-entry
cve.org
访问
cve.org
71735
vdb-entry
cve.org
访问
cve.org
CVSS评分详情
7.2
HIGH
CVSS向量:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS版本:
2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2011-04-13 20:07:00
修改时间:
2024-08-06 22:21:33
创建时间:
2025-11-11 15:33:14
更新时间:
2025-11-11 15:49:50
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2011-1229 |
2025-11-11 15:18:21 | 2025-11-11 07:33:14 |
| NVD | nvd_CVE-2011-1229 |
2025-11-11 14:53:42 | 2025-11-11 07:42:03 |
| CNNVD | cnnvd_CNNVD-201104-132 |
2025-11-11 15:09:12 | 2025-11-11 07:49:50 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:49:50
vulnerability_type: 未提取 → 代码问题; cnnvd_id: 未提取 → CNNVD-201104-132; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 代码问题
- cnnvd_id: 未提取 -> CNNVD-201104-132
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:42:03
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.2; cvss_vector: NOT_EXTRACTED → AV:L/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 36; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.2
- cvss_vector: NOT_EXTRACTED -> AV:L/AC:L/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 36
- data_sources: ['cve'] -> ['cve', 'nvd']