All the vulnerabilites related to avaya - speech_access
cve-2011-1229
Vulnerability from cvelistv5
Published
2011-04-13 20:07
Modified
2024-08-06 22:21
Severity ?
Summary
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:21:33.406Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "47229",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47229"
          },
          {
            "name": "TA11-102A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
          },
          {
            "name": "mswin-win32k-var17-priv-escalation(66411)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411"
          },
          {
            "name": "MS11-034",
            "tags": [
              "vendor-advisory",
              "x_refsource_MS",
              "x_transferred"
            ],
            "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
          },
          {
            "name": "ADV-2011-0952",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0952"
          },
          {
            "name": "oval:org.mitre.oval:def:12503",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/css/P8/documents/100133352"
          },
          {
            "name": "44156",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44156"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
          },
          {
            "name": "1025345",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025345"
          },
          {
            "name": "71735",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/71735"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-04-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other \"Vulnerability Type 2\" CVEs listed in MS11-034, aka \"Win32k Null Pointer De-reference Vulnerability.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-12T19:57:01",
        "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
        "shortName": "microsoft"
      },
      "references": [
        {
          "name": "47229",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47229"
        },
        {
          "name": "TA11-102A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
        },
        {
          "name": "mswin-win32k-var17-priv-escalation(66411)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411"
        },
        {
          "name": "MS11-034",
          "tags": [
            "vendor-advisory",
            "x_refsource_MS"
          ],
          "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
        },
        {
          "name": "ADV-2011-0952",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0952"
        },
        {
          "name": "oval:org.mitre.oval:def:12503",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/css/P8/documents/100133352"
        },
        {
          "name": "44156",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44156"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
        },
        {
          "name": "1025345",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025345"
        },
        {
          "name": "71735",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/71735"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@microsoft.com",
          "ID": "CVE-2011-1229",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other \"Vulnerability Type 2\" CVEs listed in MS11-034, aka \"Win32k Null Pointer De-reference Vulnerability.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "47229",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47229"
            },
            {
              "name": "TA11-102A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
            },
            {
              "name": "mswin-win32k-var17-priv-escalation(66411)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411"
            },
            {
              "name": "MS11-034",
              "refsource": "MS",
              "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
            },
            {
              "name": "ADV-2011-0952",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0952"
            },
            {
              "name": "oval:org.mitre.oval:def:12503",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503"
            },
            {
              "name": "http://support.avaya.com/css/P8/documents/100133352",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/css/P8/documents/100133352"
            },
            {
              "name": "44156",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44156"
            },
            {
              "name": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
              "refsource": "MISC",
              "url": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
            },
            {
              "name": "1025345",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025345"
            },
            {
              "name": "71735",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/71735"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
    "assignerShortName": "microsoft",
    "cveId": "CVE-2011-1229",
    "datePublished": "2011-04-13T20:07:00",
    "dateReserved": "2011-03-04T00:00:00",
    "dateUpdated": "2024-08-06T22:21:33.406Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2011-04-13 20:26
Modified
2024-11-21 01:25
Severity ?
Summary
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
References
secure@microsoft.comhttp://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspxVendor Advisory
secure@microsoft.comhttp://osvdb.org/71735Broken Link
secure@microsoft.comhttp://secunia.com/advisories/44156Third Party Advisory
secure@microsoft.comhttp://support.avaya.com/css/P8/documents/100133352Third Party Advisory
secure@microsoft.comhttp://www.securityfocus.com/bid/47229Third Party Advisory, VDB Entry
secure@microsoft.comhttp://www.securitytracker.com/id?1025345Third Party Advisory, VDB Entry
secure@microsoft.comhttp://www.us-cert.gov/cas/techalerts/TA11-102A.htmlThird Party Advisory, US Government Resource
secure@microsoft.comhttp://www.vupen.com/english/advisories/2011/0952Broken Link
secure@microsoft.comhttps://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034Patch, Vendor Advisory
secure@microsoft.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/66411VDB Entry
secure@microsoft.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspxVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/71735Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44156Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/css/P8/documents/100133352Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/47229Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025345Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA11-102A.htmlThird Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0952Broken Link
af854a3a-2127-422b-91ae-364da2661108https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/66411VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "3C0C7D2B-0AA5-4E82-B58B-2668A0EAC2E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*",
              "matchCriteriaId": "B20DD263-5A62-4CB1-BD47-D1F9A6C67E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*",
              "matchCriteriaId": "B7674920-AE12-4A25-BE57-34AEDDA74D76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
              "matchCriteriaId": "B320A104-9037-487E-BC9A-62B4A6B49FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
              "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*",
              "matchCriteriaId": "7211B5C5-6B6E-4A33-88BC-1D64CD684204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:x64:*",
              "matchCriteriaId": "6FF85ADB-8F36-424D-9F4A-BD357304CE66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*",
              "matchCriteriaId": "BADB0479-3E0E-4326-B568-9DBDCACF0B5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:avaya:agent_access:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A2A343-6084-4123-80AB-99508101821B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F74A4C-8A30-4CE7-81CB-85248313E78F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:basic_call_management_system_reporting_desktop:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E47123FC-A4C4-4806-A708-6F31455FA030",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:call_management_server_supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0697163-0E8F-40DF-BA37-5506EFF383F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:callpilot:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB19CA9F-6272-4E9C-A986-6ED5B199894A",
              "versionEndIncluding": "5.0.x",
              "versionStartIncluding": "4.0.x",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:callvisor_asai_lan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B145E412-2D7B-4961-94CA-1BEE72D93067",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:communication_server_1000_telephony_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0E8DB4-973E-4A92-AFC0-809EF9612020",
              "versionEndIncluding": "4.0.0",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:computer_telephony:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7CB383-65EB-4B90-A987-1BEBA6F0804A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:contact_center_express:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A5BAB1E-B4CA-465B-9305-EB9A4B60A18D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:customer_interaction_express:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "456FCAC1-3789-4C51-98EB-31C3502A2CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:enterprise_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D010DC3-3263-4D74-80AB-29AF09159346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D12D6986-429E-4152-A6E5-4CC1FB9556D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:interaction_center:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A9CC958-7300-4CEF-95BE-4DE004DCFE45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F01ED7E7-0B36-407E-B0A5-3878A269BCB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:ip_softphone:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B63252E0-FB28-4854-81D5-DF654F1758F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:meeting_exchange:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBE28C39-5C7A-46A8-9718-33C0EB579C66",
              "versionEndIncluding": "5.2.0",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:messaging_application_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FC25636-CED5-4D7C-866E-0E98E0838EDE",
              "versionEndIncluding": "5.2.x",
              "versionStartIncluding": "4.0.x",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:network_reporting:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84EB1E01-DB96-402F-AFD5-C7471898798A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:octelaccess_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E53EA20-1C16-4990-B6AB-5DB152BBB663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:octeldesigner:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2DED01-5279-45E6-B2F9-043AE42C2014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:operational_analyst:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F048BA5-841B-4F42-A46F-269D503B4261",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:outbound_contact_management:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "809622B0-E540-4D53-881C-CC7452742065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:speech_access:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3587A97-16EA-4E58-BC01-CE37BA2FEE0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:unified_communication_center:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "963D3743-3FBA-4AA4-8FA0-0D567E5DED71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:unified_messenger:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2635C6CE-082B-4CE1-87B5-38C11D33A9A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:visual_messenger:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA613FC6-09A1-4873-9481-E00571A64FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:visual_vector_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3045D507-ECEE-49F4-8080-B440A1B97240",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:vpnmanager_console:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB7AC00-A06F-4A4D-A173-704F1D4A6709",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:web_messenger:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D520A8CD-CA81-4CA4-85FE-C83E5DE541F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other \"Vulnerability Type 2\" CVEs listed in MS11-034, aka \"Win32k Null Pointer De-reference Vulnerability.\""
    },
    {
      "lang": "es",
      "value": "Vulneravilidad de desreferencia a puntero nulo en win32k.sys en el controlador  kernel-modeen en Microsoft Windows XP SP2 ySP3, Windows Server 2003 SP2, Windows Vista SP1 y SP2, Windows Server 2008 Gold, SP2, R2, y R2 SP1, y Windows 7 Gold y SP1, permite a usuarios locales obtener privilegios a trav\u00e9s de aplicaciones manipuladas  lanzan un desreferencia a puntero nulo. Vulnerabilidad distinta de \"Vulnerabilidad tipo 2\" listada en los CVEs en MS11-034, tambi\u00e9n conocida como \"Win32k Null Pointer De-reference Vulnerability.\""
    }
  ],
  "id": "CVE-2011-1229",
  "lastModified": "2024-11-21T01:25:50.840",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-13T20:26:25.250",
  "references": [
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/71735"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/44156"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.avaya.com/css/P8/documents/100133352"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/47229"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1025345"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0952"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/71735"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/44156"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.avaya.com/css/P8/documents/100133352"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/47229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1025345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66411"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503"
    }
  ],
  "sourceIdentifier": "secure@microsoft.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}