Vulnerabilites related to avaya - contact_center_express
cve-2011-1229
Vulnerability from cvelistv5
Published
2011-04-13 20:07
Modified
2024-08-06 22:21
Severity ?
EPSS score ?
Summary
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/47229 | vdb-entry, x_refsource_BID | |
http://www.us-cert.gov/cas/techalerts/TA11-102A.html | third-party-advisory, x_refsource_CERT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/66411 | vdb-entry, x_refsource_XF | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034 | vendor-advisory, x_refsource_MS | |
http://www.vupen.com/english/advisories/2011/0952 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503 | vdb-entry, signature, x_refsource_OVAL | |
http://support.avaya.com/css/P8/documents/100133352 | x_refsource_CONFIRM | |
http://secunia.com/advisories/44156 | third-party-advisory, x_refsource_SECUNIA | |
http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx | x_refsource_MISC | |
http://www.securitytracker.com/id?1025345 | vdb-entry, x_refsource_SECTRACK | |
http://osvdb.org/71735 | vdb-entry, x_refsource_OSVDB |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T22:21:33.406Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "47229", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/47229", }, { name: "TA11-102A", tags: [ "third-party-advisory", "x_refsource_CERT", "x_transferred", ], url: "http://www.us-cert.gov/cas/techalerts/TA11-102A.html", }, { name: "mswin-win32k-var17-priv-escalation(66411)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411", }, { name: "MS11-034", tags: [ "vendor-advisory", "x_refsource_MS", "x_transferred", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034", }, { name: "ADV-2011-0952", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2011/0952", }, { name: "oval:org.mitre.oval:def:12503", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.avaya.com/css/P8/documents/100133352", }, { name: "44156", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/44156", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx", }, { name: "1025345", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1025345", }, { name: "71735", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/71735", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2011-04-12T00:00:00", descriptions: [ { lang: "en", value: "win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other \"Vulnerability Type 2\" CVEs listed in MS11-034, aka \"Win32k Null Pointer De-reference Vulnerability.\"", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-12T19:57:01", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "47229", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/47229", }, { name: "TA11-102A", tags: [ "third-party-advisory", "x_refsource_CERT", ], url: "http://www.us-cert.gov/cas/techalerts/TA11-102A.html", }, { name: "mswin-win32k-var17-priv-escalation(66411)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411", }, { name: "MS11-034", tags: [ "vendor-advisory", "x_refsource_MS", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034", }, { name: "ADV-2011-0952", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2011/0952", }, { name: "oval:org.mitre.oval:def:12503", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.avaya.com/css/P8/documents/100133352", }, { name: "44156", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/44156", }, { tags: [ "x_refsource_MISC", ], url: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx", }, { name: "1025345", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1025345", }, { name: "71735", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/71735", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@microsoft.com", ID: "CVE-2011-1229", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other \"Vulnerability Type 2\" CVEs listed in MS11-034, aka \"Win32k Null Pointer De-reference Vulnerability.\"", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "47229", refsource: "BID", url: "http://www.securityfocus.com/bid/47229", }, { name: "TA11-102A", refsource: "CERT", url: "http://www.us-cert.gov/cas/techalerts/TA11-102A.html", }, { name: "mswin-win32k-var17-priv-escalation(66411)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411", }, { name: "MS11-034", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034", }, { name: "ADV-2011-0952", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2011/0952", }, { name: "oval:org.mitre.oval:def:12503", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503", }, { name: "http://support.avaya.com/css/P8/documents/100133352", refsource: "CONFIRM", url: "http://support.avaya.com/css/P8/documents/100133352", }, { name: "44156", refsource: "SECUNIA", url: "http://secunia.com/advisories/44156", }, { name: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx", refsource: "MISC", url: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx", }, { name: "1025345", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1025345", }, { name: "71735", refsource: "OSVDB", url: "http://osvdb.org/71735", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2011-1229", datePublished: "2011-04-13T20:07:00", dateReserved: "2011-03-04T00:00:00", dateUpdated: "2024-08-06T22:21:33.406Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2011-04-13 20:26
Modified
2024-11-21 01:25
Severity ?
Summary
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*", matchCriteriaId: "3C0C7D2B-0AA5-4E82-B58B-2668A0EAC2E9", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", matchCriteriaId: "E33796DB-4523-4F04-B564-ADF030553D51", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", matchCriteriaId: "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", matchCriteriaId: "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", matchCriteriaId: "32623D48-7000-4C7D-823F-7D2A9841D88C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*", matchCriteriaId: "B20DD263-5A62-4CB1-BD47-D1F9A6C67E08", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*", matchCriteriaId: "B7674920-AE12-4A25-BE57-34AEDDA74D76", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", matchCriteriaId: "B320A104-9037-487E-BC9A-62B4A6B49FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", matchCriteriaId: "3A04E39A-623E-45CA-A5FC-25DAA0F275A3", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*", matchCriteriaId: "7211B5C5-6B6E-4A33-88BC-1D64CD684204", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", matchCriteriaId: "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:x64:*", matchCriteriaId: "6FF85ADB-8F36-424D-9F4A-BD357304CE66", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*", matchCriteriaId: "BADB0479-3E0E-4326-B568-9DBDCACF0B5E", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", matchCriteriaId: "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:avaya:agent_access:*:*:*:*:*:*:*:*", matchCriteriaId: "41A2A343-6084-4123-80AB-99508101821B", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "34F74A4C-8A30-4CE7-81CB-85248313E78F", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:basic_call_management_system_reporting_desktop:*:*:*:*:*:*:*:*", matchCriteriaId: "E47123FC-A4C4-4806-A708-6F31455FA030", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:call_management_server_supervisor:*:*:*:*:*:*:*:*", matchCriteriaId: "C0697163-0E8F-40DF-BA37-5506EFF383F9", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:callpilot:*:*:*:*:*:*:*:*", matchCriteriaId: "BB19CA9F-6272-4E9C-A986-6ED5B199894A", versionEndIncluding: "5.0.x", versionStartIncluding: "4.0.x", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:callvisor_asai_lan:*:*:*:*:*:*:*:*", matchCriteriaId: "B145E412-2D7B-4961-94CA-1BEE72D93067", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:communication_server_1000_telephony_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "AB0E8DB4-973E-4A92-AFC0-809EF9612020", versionEndIncluding: "4.0.0", versionStartIncluding: "3.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:computer_telephony:*:*:*:*:*:*:*:*", matchCriteriaId: "2C7CB383-65EB-4B90-A987-1BEBA6F0804A", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:contact_center_express:*:*:*:*:*:*:*:*", matchCriteriaId: "0A5BAB1E-B4CA-465B-9305-EB9A4B60A18D", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:customer_interaction_express:*:*:*:*:*:*:*:*", matchCriteriaId: "456FCAC1-3789-4C51-98EB-31C3502A2CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:enterprise_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "6D010DC3-3263-4D74-80AB-29AF09159346", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*", matchCriteriaId: "D12D6986-429E-4152-A6E5-4CC1FB9556D3", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:interaction_center:*:*:*:*:*:*:*:*", matchCriteriaId: "4A9CC958-7300-4CEF-95BE-4DE004DCFE45", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:ip_agent:*:*:*:*:*:*:*:*", matchCriteriaId: "F01ED7E7-0B36-407E-B0A5-3878A269BCB4", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:ip_softphone:*:*:*:*:*:*:*:*", matchCriteriaId: "B63252E0-FB28-4854-81D5-DF654F1758F7", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:meeting_exchange:*:*:*:*:*:*:*:*", matchCriteriaId: "DBE28C39-5C7A-46A8-9718-33C0EB579C66", versionEndIncluding: "5.2.0", versionStartIncluding: "5.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:messaging_application_server:*:*:*:*:*:*:*:*", matchCriteriaId: "1FC25636-CED5-4D7C-866E-0E98E0838EDE", versionEndIncluding: "5.2.x", versionStartIncluding: "4.0.x", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:network_reporting:*:*:*:*:*:*:*:*", matchCriteriaId: "84EB1E01-DB96-402F-AFD5-C7471898798A", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:octelaccess_server:*:*:*:*:*:*:*:*", matchCriteriaId: "6E53EA20-1C16-4990-B6AB-5DB152BBB663", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:octeldesigner:*:*:*:*:*:*:*:*", matchCriteriaId: "6A2DED01-5279-45E6-B2F9-043AE42C2014", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:operational_analyst:*:*:*:*:*:*:*:*", matchCriteriaId: "3F048BA5-841B-4F42-A46F-269D503B4261", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:outbound_contact_management:*:*:*:*:*:*:*:*", matchCriteriaId: "809622B0-E540-4D53-881C-CC7452742065", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:speech_access:*:*:*:*:*:*:*:*", matchCriteriaId: "F3587A97-16EA-4E58-BC01-CE37BA2FEE0E", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:unified_communication_center:*:*:*:*:*:*:*:*", matchCriteriaId: "963D3743-3FBA-4AA4-8FA0-0D567E5DED71", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:unified_messenger:*:*:*:*:*:*:*:*", matchCriteriaId: "2635C6CE-082B-4CE1-87B5-38C11D33A9A9", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:visual_messenger:*:*:*:*:*:*:*:*", matchCriteriaId: "FA613FC6-09A1-4873-9481-E00571A64FA3", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:visual_vector_client:*:*:*:*:*:*:*:*", matchCriteriaId: "3045D507-ECEE-49F4-8080-B440A1B97240", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:vpnmanager_console:*:*:*:*:*:*:*:*", matchCriteriaId: "DEB7AC00-A06F-4A4D-A173-704F1D4A6709", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:web_messenger:*:*:*:*:*:*:*:*", matchCriteriaId: "D520A8CD-CA81-4CA4-85FE-C83E5DE541F5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other \"Vulnerability Type 2\" CVEs listed in MS11-034, aka \"Win32k Null Pointer De-reference Vulnerability.\"", }, { lang: "es", value: "Vulneravilidad de desreferencia a puntero nulo en win32k.sys en el controlador kernel-modeen en Microsoft Windows XP SP2 ySP3, Windows Server 2003 SP2, Windows Vista SP1 y SP2, Windows Server 2008 Gold, SP2, R2, y R2 SP1, y Windows 7 Gold y SP1, permite a usuarios locales obtener privilegios a través de aplicaciones manipuladas lanzan un desreferencia a puntero nulo. Vulnerabilidad distinta de \"Vulnerabilidad tipo 2\" listada en los CVEs en MS11-034, también conocida como \"Win32k Null Pointer De-reference Vulnerability.\"", }, ], id: "CVE-2011-1229", lastModified: "2024-11-21T01:25:50.840", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2011-04-13T20:26:25.250", references: [ { source: "secure@microsoft.com", tags: [ "Vendor Advisory", ], url: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx", }, { source: "secure@microsoft.com", tags: [ "Broken Link", ], url: "http://osvdb.org/71735", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "http://secunia.com/advisories/44156", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "http://support.avaya.com/css/P8/documents/100133352", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/47229", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id?1025345", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA11-102A.html", }, { source: "secure@microsoft.com", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2011/0952", }, { source: "secure@microsoft.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034", }, { source: "secure@microsoft.com", tags: [ "VDB Entry", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://osvdb.org/71735", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://secunia.com/advisories/44156", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://support.avaya.com/css/P8/documents/100133352", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/47229", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id?1025345", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA11-102A.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2011/0952", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "VDB Entry", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503", }, ], sourceIdentifier: "secure@microsoft.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }