Vulnerabilities > CVE-2011-1877 - Resource Management Errors vulnerability in Microsoft Windows 7, Windows Server 2008 and Windows Vista
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, aka "Win32k Use After Free Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 13 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS11-054 |
bulletin_url | |
date | 2011-07-12T00:00:00 |
impact | Elevation of Privilege |
knowledgebase_id | 2555917 |
knowledgebase_url | |
severity | Important |
title | Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS11-054.NASL |
description | The remote host is running a version of the Windows kernel that is affected by the following vulnerabilities : - Multiple privilege escalation vulnerabilities exist due to the way that Windows kernel-mode drivers manage driver objects. (CVE-2011-1874, CVE-2011-1875, CVE-2011-1876, CVE-2011-1877, CVE-2011-1878, CVE-2011-1879, CVE-2011-1880, CVE-2011-1881, CVE-2011-1882, CVE-2011-1883, CVE-2011-1884, CVE-2011-1885, CVE-2011-1887, CVE-2011-1888) - An information disclosure vulnerability exists due to the way that Windows kernel-mode drivers validate function parameters. (CVE-2011-1886) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 55570 |
published | 2011-07-12 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/55570 |
title | MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2555917) |
code |
|
Oval
accepted | 2013-05-06T04:01:03.438-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, aka "Win32k Use After Free Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:12847 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2011-07-12T13:00:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | Win32k Use After Free Vulnerability (CVE-2011-1877) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 75 |
References
- http://support.avaya.com/css/P8/documents/100144947
- http://secunia.com/advisories/45186
- http://osvdb.org/73779
- http://www.securityfocus.com/bid/48591
- http://www.securitytracker.com/id?1025761
- http://www.us-cert.gov/cas/techalerts/TA11-193A.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12847
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-054