Vulnerabilites related to avaya - contact_center_express
cve-2011-1229
Vulnerability from cvelistv5
Published
2011-04-13 20:07
Modified
2024-08-06 22:21
Severity ?
Summary
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T22:21:33.406Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "47229",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/47229",
               },
               {
                  name: "TA11-102A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA11-102A.html",
               },
               {
                  name: "mswin-win32k-var17-priv-escalation(66411)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411",
               },
               {
                  name: "MS11-034",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MS",
                     "x_transferred",
                  ],
                  url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034",
               },
               {
                  name: "ADV-2011-0952",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0952",
               },
               {
                  name: "oval:org.mitre.oval:def:12503",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.avaya.com/css/P8/documents/100133352",
               },
               {
                  name: "44156",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/44156",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
               },
               {
                  name: "1025345",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1025345",
               },
               {
                  name: "71735",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/71735",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-04-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other \"Vulnerability Type 2\" CVEs listed in MS11-034, aka \"Win32k Null Pointer De-reference Vulnerability.\"",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-12T19:57:01",
            orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
            shortName: "microsoft",
         },
         references: [
            {
               name: "47229",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/47229",
            },
            {
               name: "TA11-102A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA11-102A.html",
            },
            {
               name: "mswin-win32k-var17-priv-escalation(66411)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411",
            },
            {
               name: "MS11-034",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MS",
               ],
               url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034",
            },
            {
               name: "ADV-2011-0952",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0952",
            },
            {
               name: "oval:org.mitre.oval:def:12503",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.avaya.com/css/P8/documents/100133352",
            },
            {
               name: "44156",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/44156",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
            },
            {
               name: "1025345",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1025345",
            },
            {
               name: "71735",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/71735",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@microsoft.com",
               ID: "CVE-2011-1229",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other \"Vulnerability Type 2\" CVEs listed in MS11-034, aka \"Win32k Null Pointer De-reference Vulnerability.\"",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "47229",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/47229",
                  },
                  {
                     name: "TA11-102A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA11-102A.html",
                  },
                  {
                     name: "mswin-win32k-var17-priv-escalation(66411)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411",
                  },
                  {
                     name: "MS11-034",
                     refsource: "MS",
                     url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034",
                  },
                  {
                     name: "ADV-2011-0952",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2011/0952",
                  },
                  {
                     name: "oval:org.mitre.oval:def:12503",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503",
                  },
                  {
                     name: "http://support.avaya.com/css/P8/documents/100133352",
                     refsource: "CONFIRM",
                     url: "http://support.avaya.com/css/P8/documents/100133352",
                  },
                  {
                     name: "44156",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/44156",
                  },
                  {
                     name: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
                     refsource: "MISC",
                     url: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
                  },
                  {
                     name: "1025345",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1025345",
                  },
                  {
                     name: "71735",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/71735",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
      assignerShortName: "microsoft",
      cveId: "CVE-2011-1229",
      datePublished: "2011-04-13T20:07:00",
      dateReserved: "2011-03-04T00:00:00",
      dateUpdated: "2024-08-06T22:21:33.406Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2011-04-13 20:26
Modified
2024-11-21 01:25
Severity ?
Summary
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
References
secure@microsoft.comhttp://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspxVendor Advisory
secure@microsoft.comhttp://osvdb.org/71735Broken Link
secure@microsoft.comhttp://secunia.com/advisories/44156Third Party Advisory
secure@microsoft.comhttp://support.avaya.com/css/P8/documents/100133352Third Party Advisory
secure@microsoft.comhttp://www.securityfocus.com/bid/47229Third Party Advisory, VDB Entry
secure@microsoft.comhttp://www.securitytracker.com/id?1025345Third Party Advisory, VDB Entry
secure@microsoft.comhttp://www.us-cert.gov/cas/techalerts/TA11-102A.htmlThird Party Advisory, US Government Resource
secure@microsoft.comhttp://www.vupen.com/english/advisories/2011/0952Broken Link
secure@microsoft.comhttps://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034Patch, Vendor Advisory
secure@microsoft.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/66411VDB Entry
secure@microsoft.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspxVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/71735Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44156Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/css/P8/documents/100133352Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/47229Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025345Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA11-102A.htmlThird Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0952Broken Link
af854a3a-2127-422b-91ae-364da2661108https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/66411VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "3C0C7D2B-0AA5-4E82-B58B-2668A0EAC2E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E33796DB-4523-4F04-B564-ADF030553D51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32623D48-7000-4C7D-823F-7D2A9841D88C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*",
                     matchCriteriaId: "B20DD263-5A62-4CB1-BD47-D1F9A6C67E08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*",
                     matchCriteriaId: "B7674920-AE12-4A25-BE57-34AEDDA74D76",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
                     matchCriteriaId: "B320A104-9037-487E-BC9A-62B4A6B49FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "3A04E39A-623E-45CA-A5FC-25DAA0F275A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*",
                     matchCriteriaId: "7211B5C5-6B6E-4A33-88BC-1D64CD684204",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "6FF85ADB-8F36-424D-9F4A-BD357304CE66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*",
                     matchCriteriaId: "BADB0479-3E0E-4326-B568-9DBDCACF0B5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avaya:agent_access:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A2A343-6084-4123-80AB-99508101821B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "34F74A4C-8A30-4CE7-81CB-85248313E78F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:basic_call_management_system_reporting_desktop:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E47123FC-A4C4-4806-A708-6F31455FA030",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:call_management_server_supervisor:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0697163-0E8F-40DF-BA37-5506EFF383F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:callpilot:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB19CA9F-6272-4E9C-A986-6ED5B199894A",
                     versionEndIncluding: "5.0.x",
                     versionStartIncluding: "4.0.x",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:callvisor_asai_lan:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B145E412-2D7B-4961-94CA-1BEE72D93067",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:communication_server_1000_telephony_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0E8DB4-973E-4A92-AFC0-809EF9612020",
                     versionEndIncluding: "4.0.0",
                     versionStartIncluding: "3.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:computer_telephony:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C7CB383-65EB-4B90-A987-1BEBA6F0804A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:contact_center_express:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A5BAB1E-B4CA-465B-9305-EB9A4B60A18D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:customer_interaction_express:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "456FCAC1-3789-4C51-98EB-31C3502A2CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:enterprise_manager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D010DC3-3263-4D74-80AB-29AF09159346",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12D6986-429E-4152-A6E5-4CC1FB9556D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:interaction_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A9CC958-7300-4CEF-95BE-4DE004DCFE45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:ip_agent:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F01ED7E7-0B36-407E-B0A5-3878A269BCB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:ip_softphone:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B63252E0-FB28-4854-81D5-DF654F1758F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:meeting_exchange:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBE28C39-5C7A-46A8-9718-33C0EB579C66",
                     versionEndIncluding: "5.2.0",
                     versionStartIncluding: "5.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:messaging_application_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FC25636-CED5-4D7C-866E-0E98E0838EDE",
                     versionEndIncluding: "5.2.x",
                     versionStartIncluding: "4.0.x",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:network_reporting:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "84EB1E01-DB96-402F-AFD5-C7471898798A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:octelaccess_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E53EA20-1C16-4990-B6AB-5DB152BBB663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:octeldesigner:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A2DED01-5279-45E6-B2F9-043AE42C2014",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:operational_analyst:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F048BA5-841B-4F42-A46F-269D503B4261",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:outbound_contact_management:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "809622B0-E540-4D53-881C-CC7452742065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:speech_access:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3587A97-16EA-4E58-BC01-CE37BA2FEE0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:unified_communication_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "963D3743-3FBA-4AA4-8FA0-0D567E5DED71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:unified_messenger:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2635C6CE-082B-4CE1-87B5-38C11D33A9A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:visual_messenger:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA613FC6-09A1-4873-9481-E00571A64FA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:visual_vector_client:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3045D507-ECEE-49F4-8080-B440A1B97240",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:vpnmanager_console:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB7AC00-A06F-4A4D-A173-704F1D4A6709",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:web_messenger:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D520A8CD-CA81-4CA4-85FE-C83E5DE541F5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other \"Vulnerability Type 2\" CVEs listed in MS11-034, aka \"Win32k Null Pointer De-reference Vulnerability.\"",
      },
      {
         lang: "es",
         value: "Vulneravilidad de desreferencia a puntero nulo en win32k.sys en el controlador  kernel-modeen en Microsoft Windows XP SP2 ySP3, Windows Server 2003 SP2, Windows Vista SP1 y SP2, Windows Server 2008 Gold, SP2, R2, y R2 SP1, y Windows 7 Gold y SP1, permite a usuarios locales obtener privilegios a través de aplicaciones manipuladas  lanzan un desreferencia a puntero nulo. Vulnerabilidad distinta de \"Vulnerabilidad tipo 2\" listada en los CVEs en MS11-034, también conocida como \"Win32k Null Pointer De-reference Vulnerability.\"",
      },
   ],
   id: "CVE-2011-1229",
   lastModified: "2024-11-21T01:25:50.840",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-04-13T20:26:25.250",
   references: [
      {
         source: "secure@microsoft.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
      },
      {
         source: "secure@microsoft.com",
         tags: [
            "Broken Link",
         ],
         url: "http://osvdb.org/71735",
      },
      {
         source: "secure@microsoft.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/44156",
      },
      {
         source: "secure@microsoft.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.avaya.com/css/P8/documents/100133352",
      },
      {
         source: "secure@microsoft.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/47229",
      },
      {
         source: "secure@microsoft.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id?1025345",
      },
      {
         source: "secure@microsoft.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA11-102A.html",
      },
      {
         source: "secure@microsoft.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0952",
      },
      {
         source: "secure@microsoft.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034",
      },
      {
         source: "secure@microsoft.com",
         tags: [
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411",
      },
      {
         source: "secure@microsoft.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://osvdb.org/71735",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/44156",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.avaya.com/css/P8/documents/100133352",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/47229",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id?1025345",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA11-102A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0952",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503",
      },
   ],
   sourceIdentifier: "secure@microsoft.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}