Executive Summary

Summary
Title Vulnerabilities in Windows Kernel
Informations
Name MS11-012 First vendor Publication 2011-02-08
Vendor Microsoft Last vendor Modification 2011-03-18
Severity (Vendor) Important Revision 2.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V2.0 (March 18, 2011): Clarified the Affected Software to include Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems Service Pack 1, Windows Server 2008 R2 for x64-based Systems Service Pack 1, and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1. See the entry to the section, Frequently Asked Questions (FAQ) Related to This Security Update, that explains this revision.Summary: This security update resolves five privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users.

Original Source

Url : http://www.microsoft.com/technet/security/bulletin/MS11-012.mspx

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11638
 
Oval ID: oval:org.mitre.oval:def:11638
Title: Win32k Window Class Improper Pointer Validation Vulnerability
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Window Class Improper Pointer Validation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-0089
Version: 10
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12070
 
Oval ID: oval:org.mitre.oval:def:12070
Title: Win32k Improper User Input Validation Vulnerability
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Improper User Input Validation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-0086
Version: 10
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12312
 
Oval ID: oval:org.mitre.oval:def:12312
Title: Win32k Insufficient User Input Validation Vulnerability
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Insufficient User Input Validation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-0087
Version: 6
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12455
 
Oval ID: oval:org.mitre.oval:def:12455
Title: Win32k Memory Corruption Vulnerability
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-0090
Version: 10
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12553
 
Oval ID: oval:org.mitre.oval:def:12553
Title: Win32k Window Class Pointer Confusion Vulnerability
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Window Class Pointer Confusion Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-0088
Version: 10
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 2
Os 2
Os 1
Os 8
Os 3
Os 2

OpenVAS Exploits

Date Description
2011-02-09 Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2479628)
File : nvt/secpod_ms11-012.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
70819 Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Pri...

Microsoft Windows contains a flaw related to insufficient user input validation that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the kernel-mode drivers validate data supplied from user mode to kernel mode, allowing a local authenticated attacker to gain administrative privileges.
70818 Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Pri...

Microsoft Windows contains a flaw related to improper user input validation that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the kernel-mode drivers validate data supplied from user mode to kernel mode, allowing a local authenticated attacker to gain administrative privileges.
70817 Microsoft Windows Kernel Class Improper Pointer Validation Unspecified Local ...

Microsoft Windows contains a flaw related to class improper point validation that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the kernel-mode drivers validate data supplied from user mode to kernel mode, allowing a local authenticated attacker to gain administrative privileges.
70816 Microsoft Windows Kernel Window Class Pointer Confusion Unspecified Local Pri...

Microsoft Windows contains a flaw related to class pointer confusion that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the kernel-mode drivers validate data supplied from user mode to kernel mode, allowing a local authenticated attacker to gain administrative privileges.
70814 Microsoft Windows Kernel Unspecified Memory Corruption Local Privilege Escala...

Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the kernel-mode drivers validate data supplied from user mode to kernel mode, allowing a local authenticated attacker to gain administrative privileges.

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows WMI tracing api integer truncation attempt
RuleID : 18413 - Revision : 16 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows win32k!xxxTrackPopupMenuEx privilege escalation attempt
RuleID : 18412 - Revision : 8 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows win32k!xxxTrackPopupMenuEx privilege escalation attempt
RuleID : 18411 - Revision : 8 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows win32k.sys write message to dead thread code execution attempt
RuleID : 18410 - Revision : 9 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows win32k.sys write message to dead thread code execution attempt
RuleID : 18409 - Revision : 9 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2011-02-08 Name : The remote Windows kernel is affected by multiple vulnerabilities.
File : smb_nt_ms11-012.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:46:52
  • Multiple Updates
2014-01-19 21:30:36
  • Multiple Updates