Vulnerabilities > CVE-2011-1886 - Local Information Disclosure vulnerability in Microsoft Windows Kernel 'Win32k.sys' (CVE-2011-1886)
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3 does not properly validate the arguments to functions, which allows local users to read arbitrary data from kernel memory via a crafted application that triggers a NULL pointer dereference, aka "Win32k Incorrect Parameter Validation Allows Information Disclosure Vulnerability." Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 |
Msbulletin
bulletin_id | MS11-054 |
bulletin_url | |
date | 2011-07-12T00:00:00 |
impact | Elevation of Privilege |
knowledgebase_id | 2555917 |
knowledgebase_url | |
severity | Important |
title | Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS11-054.NASL |
description | The remote host is running a version of the Windows kernel that is affected by the following vulnerabilities : - Multiple privilege escalation vulnerabilities exist due to the way that Windows kernel-mode drivers manage driver objects. (CVE-2011-1874, CVE-2011-1875, CVE-2011-1876, CVE-2011-1877, CVE-2011-1878, CVE-2011-1879, CVE-2011-1880, CVE-2011-1881, CVE-2011-1882, CVE-2011-1883, CVE-2011-1884, CVE-2011-1885, CVE-2011-1887, CVE-2011-1888) - An information disclosure vulnerability exists due to the way that Windows kernel-mode drivers validate function parameters. (CVE-2011-1886) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 55570 |
published | 2011-07-12 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/55570 |
title | MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2555917) |
code |
|
Oval
accepted | 2011-08-22T04:00:50.356-04:00 | ||||
class | vulnerability | ||||
contributors |
| ||||
definition_extensions |
| ||||
description | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3 does not properly validate the arguments to functions, which allows local users to read arbitrary data from kernel memory via a crafted application that triggers a NULL pointer dereference, aka "Win32k Incorrect Parameter Validation Allows Information Disclosure Vulnerability." | ||||
family | windows | ||||
id | oval:org.mitre.oval:def:12778 | ||||
status | accepted | ||||
submitted | 2011-07-12T13:00:00 | ||||
title | win32k Incorrect Parameter Validation Allows Information Disclosure Vulnerability (CVE-2011-1886) | ||||
version | 72 |
References
- http://osvdb.org/73791
- http://secunia.com/advisories/45186
- http://support.avaya.com/css/P8/documents/100144947
- http://www.securityfocus.com/bid/48607
- http://www.securitytracker.com/id?1025761
- http://www.us-cert.gov/cas/techalerts/TA11-193A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-054
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12778