Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-0037 | First vendor Publication | 2011-02-25 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Malware Protection Engine before 1.1.6603.0, as used in Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, and Windows Live OneCare, allows local users to gain privileges via a crafted value of an unspecified user registry key. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0037 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application |
| 5 |
Application | 1 | |
Application | 1 | |
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
71017 | Microsoft Malware Protection Engine (MMPE) Crafted Registry Key Local Privile... Microsoft Malware Protection Engine contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when an error occurs during scanning, allowing a local attacker to gain LocalSystem privileges via a crafted registry key value. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Malware Protection Engine elevation of privilege attempt RuleID : 18501 - Revision : 9 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-18 | Name : The remote host has an antimalware application that is affected by a denial o... File : smb_kb2974294.nasl - Type : ACT_GATHER_INFO |
2013-05-15 | Name : The remote host has an antimalware application that is affected by a code exe... File : smb_kb2846338.nasl - Type : ACT_GATHER_INFO |
2011-02-25 | Name : The remote host has an application that is affected by a local privilege esca... File : smb_kb2491888.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:05:57 |
|
2024-11-28 12:24:18 |
|
2021-07-23 01:08:17 |
|
2021-05-04 12:13:44 |
|
2021-04-22 01:14:53 |
|
2020-05-23 01:43:36 |
|
2020-05-23 00:27:29 |
|
2017-08-17 09:23:13 |
|
2016-06-28 18:28:51 |
|
2016-04-26 20:27:01 |
|
2014-02-17 10:59:17 |
|
2014-02-12 21:21:13 |
|
2014-01-19 21:27:20 |
|
2013-05-10 22:51:54 |
|