CVE-2011-0666Microsoft Windows Server 2008 vulnerability

CWE-3996 documents4 sources
Severity
7.2HIGHNVD
EPSS
0.7%
top 26.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 13
Latest updateMay 13

Description

Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

🔴Vulnerability Details

1
GHSA
GHSA-6h85-h7jp-9g6v: Use-after-free vulnerability in win32k2022-05-13

📋Vendor Advisories

2
Red Hat
OpenIPMI: IPMI event daemon creates PID file with world writeable permissions2011-12-13
Red Hat
openswan: World writable pid and lock files2011-05-11

💬Community

2
Bugzilla
CVE-2011-4339 OpenIPMI: IPMI event daemon creates PID file with world writeable permissions2011-10-03
Bugzilla
CVE-2011-2147 openswan: World writable pid and lock files2011-05-30