CVE-2011-1229 (CNNVD-201104-132)

HIGH
中文标题:
Microsoft Windows多个平台内核模式驱动程序Win32k空指针解引用漏洞
英文标题:
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, ...
CVSS分数: 7.2
发布时间: 2011-04-13 20:07:00
漏洞类型: 代码问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 由于Windows内核模式驱动程序管理至内核模式驱动程序对象的指针的方式而存在特权提升漏洞。成功利用此漏洞的攻击者可以运行内核模式中的任意代码。攻击者可随后安装程序;查看、更改或删除数据;或者创建拥有完全用户权限的新帐户。

英文描述:

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."

CWE类型:
CWE-476
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
microsoft windows_2003_server - - - cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*
microsoft windows_7 - - - cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
microsoft windows_server_2003 - - - cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
microsoft windows_server_2008 - - - cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
microsoft windows_server_2008 r2 - - cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
microsoft windows_vista - - - cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
microsoft windows_xp - - - cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*
avaya agent_access * - - cpe:2.3:a:avaya:agent_access:*:*:*:*:*:*:*:*
avaya aura_conferencing_standard_edition 6.0.0 - - cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0:*:*:*:*:*:*:*
avaya basic_call_management_system_reporting_desktop * - - cpe:2.3:a:avaya:basic_call_management_system_reporting_desktop:*:*:*:*:*:*:*:*
avaya call_management_server_supervisor * - - cpe:2.3:a:avaya:call_management_server_supervisor:*:*:*:*:*:*:*:*
avaya callpilot * - - cpe:2.3:a:avaya:callpilot:*:*:*:*:*:*:*:*
avaya callvisor_asai_lan * - - cpe:2.3:a:avaya:callvisor_asai_lan:*:*:*:*:*:*:*:*
avaya communication_server_1000_telephony_manager * - - cpe:2.3:a:avaya:communication_server_1000_telephony_manager:*:*:*:*:*:*:*:*
avaya computer_telephony * - - cpe:2.3:a:avaya:computer_telephony:*:*:*:*:*:*:*:*
avaya contact_center_express * - - cpe:2.3:a:avaya:contact_center_express:*:*:*:*:*:*:*:*
avaya customer_interaction_express * - - cpe:2.3:a:avaya:customer_interaction_express:*:*:*:*:*:*:*:*
avaya enterprise_manager * - - cpe:2.3:a:avaya:enterprise_manager:*:*:*:*:*:*:*:*
avaya integrated_management * - - cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*
avaya interaction_center * - - cpe:2.3:a:avaya:interaction_center:*:*:*:*:*:*:*:*
avaya ip_agent * - - cpe:2.3:a:avaya:ip_agent:*:*:*:*:*:*:*:*
avaya ip_softphone * - - cpe:2.3:a:avaya:ip_softphone:*:*:*:*:*:*:*:*
avaya meeting_exchange * - - cpe:2.3:a:avaya:meeting_exchange:*:*:*:*:*:*:*:*
avaya messaging_application_server * - - cpe:2.3:a:avaya:messaging_application_server:*:*:*:*:*:*:*:*
avaya network_reporting * - - cpe:2.3:a:avaya:network_reporting:*:*:*:*:*:*:*:*
avaya octelaccess_server * - - cpe:2.3:a:avaya:octelaccess_server:*:*:*:*:*:*:*:*
avaya octeldesigner * - - cpe:2.3:a:avaya:octeldesigner:*:*:*:*:*:*:*:*
avaya operational_analyst * - - cpe:2.3:a:avaya:operational_analyst:*:*:*:*:*:*:*:*
avaya outbound_contact_management * - - cpe:2.3:a:avaya:outbound_contact_management:*:*:*:*:*:*:*:*
avaya speech_access * - - cpe:2.3:a:avaya:speech_access:*:*:*:*:*:*:*:*
avaya unified_communication_center * - - cpe:2.3:a:avaya:unified_communication_center:*:*:*:*:*:*:*:*
avaya unified_messenger * - - cpe:2.3:a:avaya:unified_messenger:*:*:*:*:*:*:*:*
avaya visual_messenger * - - cpe:2.3:a:avaya:visual_messenger:*:*:*:*:*:*:*:*
avaya visual_vector_client * - - cpe:2.3:a:avaya:visual_vector_client:*:*:*:*:*:*:*:*
avaya vpnmanager_console * - - cpe:2.3:a:avaya:vpnmanager_console:*:*:*:*:*:*:*:*
avaya web_messenger * - - cpe:2.3:a:avaya:web_messenger:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
47229 vdb-entry
cve.org
访问
TA11-102A third-party-advisory
cve.org
访问
mswin-win32k-var17-priv-escalation(66411) vdb-entry
cve.org
访问
MS11-034 vendor-advisory
cve.org
访问
ADV-2011-0952 vdb-entry
cve.org
访问
oval:org.mitre.oval:def:12503 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
44156 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
1025345 vdb-entry
cve.org
访问
71735 vdb-entry
cve.org
访问
CVSS评分详情
7.2
HIGH
CVSS向量: AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2011-04-13 20:07:00
修改时间:
2024-08-06 22:21:33
创建时间:
2025-11-11 15:33:14
更新时间:
2025-11-11 15:49:50
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2011-1229 2025-11-11 15:18:21 2025-11-11 07:33:14
NVD nvd_CVE-2011-1229 2025-11-11 14:53:42 2025-11-11 07:42:03
CNNVD cnnvd_CNNVD-201104-132 2025-11-11 15:09:12 2025-11-11 07:49:50
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:49:50
vulnerability_type: 未提取 → 代码问题; cnnvd_id: 未提取 → CNNVD-201104-132; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 代码问题
  • cnnvd_id: 未提取 -> CNNVD-201104-132
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:03
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.2; cvss_vector: NOT_EXTRACTED → AV:L/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 36; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.2
  • cvss_vector: NOT_EXTRACTED -> AV:L/AC:L/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 36
  • data_sources: ['cve'] -> ['cve', 'nvd']