Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-1984 | First vendor Publication | 2011-09-15 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
WINS in Microsoft Windows Server 2003 SP2 and Server 2008 SP2, R2, and R2 SP1 allows local users to gain privileges by sending crafted packets over the loopback interface, aka "WINS Local Elevation of Privilege Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1984 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12634 | |||
Oval ID: | oval:org.mitre.oval:def:12634 | ||
Title: | WINS Local Elevation of Privilege Vulnerability | ||
Description: | WINS in Microsoft Windows Server 2003 SP2 and Server 2008 SP2, R2, and R2 SP1 allows local users to gain privileges by sending crafted packets over the loopback interface, aka "WINS Local Elevation of Privilege Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-1984 | Version: | 3 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 3 |
ExploitDB Exploits
id | Description |
---|---|
2011-09-13 | MS WINS ECommEndDlg Input Validation Error |
OpenVAS Exploits
Date | Description |
---|---|
2011-09-14 | Name : Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621) File : nvt/secpod_ms11-070.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
75444 | Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Esca... |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2011-09-15 | IAVM : 2011-A-0126 - Microsoft Windows WINS Server Privilege Escalation Vulnerability Severity : Category I - VMSKEY : V0030247 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows WINS internal communications on network exploit attempt RuleID : 20120 - Revision : 7 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-09-14 | Name : Arbitrary code can be executed on the remote host through Microsoft Windows I... File : smb_nt_ms11-070.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:04:14 |
|
2024-11-28 12:25:45 |
|
2024-08-02 12:16:35 |
|
2024-08-02 01:04:41 |
|
2024-02-02 01:16:06 |
|
2024-02-01 12:04:35 |
|
2023-09-05 12:15:05 |
|
2023-09-05 01:04:27 |
|
2023-09-02 12:15:08 |
|
2023-09-02 01:04:32 |
|
2023-08-12 12:18:17 |
|
2023-08-12 01:04:32 |
|
2023-08-11 12:15:13 |
|
2023-08-11 01:04:40 |
|
2023-08-06 12:14:38 |
|
2023-08-06 01:04:33 |
|
2023-08-04 12:14:43 |
|
2023-08-04 01:04:34 |
|
2023-07-14 12:14:42 |
|
2023-07-14 01:04:31 |
|
2023-03-29 01:16:37 |
|
2023-03-28 12:04:37 |
|
2022-10-11 12:13:06 |
|
2022-10-11 01:04:17 |
|
2021-05-04 12:14:31 |
|
2021-04-22 01:15:48 |
|
2020-09-28 17:22:43 |
|
2020-05-23 00:28:33 |
|
2019-02-26 17:19:36 |
|
2018-10-13 05:18:32 |
|
2018-09-20 12:08:59 |
|
2017-09-19 09:24:27 |
|
2016-09-30 01:03:01 |
|
2016-08-31 12:02:45 |
|
2016-06-28 18:39:59 |
|
2016-04-26 20:46:19 |
|
2014-02-17 11:02:32 |
|
2014-01-19 21:27:51 |
|
2013-11-11 12:39:25 |
|
2013-05-10 23:00:56 |
|