Vulnerabilities > CVE-2011-1870 - Numeric Errors vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer overflow in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that triggers an incorrect memory assignment for a user transaction, aka "CSRSS Local EOP SrvWriteConsoleOutputString Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS11-056 |
bulletin_url | |
date | 2011-07-12T00:00:00 |
impact | Elevation of Privilege |
knowledgebase_id | 2507938 |
knowledgebase_url | |
severity | Important |
title | Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS11-056.NASL |
description | The remote host allows elevation of privileges in its Windows Client/Server run-time subsystem (CSRSS). An attacker could exploit these vulnerabilities to run arbitrary code in kernel mode. The attacker must have valid login credentials and be able to log on locally in order to exploit these vulnerabilities. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 55572 |
published | 2011-07-12 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/55572 |
title | MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2507938) |
code |
|
Oval
accepted | 2011-08-22T04:00:58.540-04:00 | ||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||
contributors |
| ||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||
description | Integer overflow in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that triggers an incorrect memory assignment for a user transaction, aka "CSRSS Local EOP SrvWriteConsoleOutputString Vulnerability." | ||||||||||||||||||||
family | windows | ||||||||||||||||||||
id | oval:org.mitre.oval:def:12889 | ||||||||||||||||||||
status | accepted | ||||||||||||||||||||
submitted | 2011-07-12T13:00:00 | ||||||||||||||||||||
title | CSRSS Local EOP SrvWriteConsoleOutputString Vulnerability | ||||||||||||||||||||
version | 72 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 48605 CVE ID: CVE-2011-1870 Microsoft Windows是微软发布的非常流行的操作系统。 Microsoft Windows CSRSS子系统SrvWriteConsoleOutputString实现上存在漏洞,本地攻击者可利用此漏洞在内核模式中执行任意代码。 此漏洞源于CSRSS子系统中的SrvWriteConsoleOutputString存在整数溢出漏洞,可造成内存破坏。 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2003 Microsoft Windows 7 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS11-056)以及相应补丁: MS11-056:Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2507938) 链接:http://www.microsoft.com/technet/security/bulletin/MS11-056.asp |
id | SSV:20722 |
last seen | 2017-11-19 |
modified | 2011-07-14 |
published | 2011-07-14 |
reporter | Root |
title | Windows CSRSS子系统SrvWriteConsoleOutputString权限提升漏洞(CVE-2011-1870)(MS11-056) |
References
- http://osvdb.org/73795
- http://www.securityfocus.com/bid/48605
- http://www.us-cert.gov/cas/techalerts/TA11-193A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-056
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12889
- http://osvdb.org/73795
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12889
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-056
- http://www.us-cert.gov/cas/techalerts/TA11-193A.html
- http://www.securityfocus.com/bid/48605