Short Name |
HTTP:STC:DL:CVE-2011-1985-CE
|
Severity |
High
|
Recommended |
Yes
|
Recommended Action |
Drop
|
Category |
HTTP
|
Keywords |
Microsoft Windows win32k.sys kernel mode null pointer dereference
|
Release Date |
2015/06/09
|
Update Number |
2503
|
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+
|
HTTP: Microsoft Windows win32k.sys kernel mode null pointer dereference
This signature detects attempts to exploit a known vulnerability in the Microsoft Windows. A successful attack can lead to arbitrary code execution.
Extended Description
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application, aka "Win32k Null Pointer De-reference Vulnerability."
Affected Products
- microsoft windows_2003_server (sp2)
- microsoft windows_7 - (-)
- microsoft windows_7 - (sp1)
- microsoft windows_7 - (sp1:x32)
- microsoft windows_7 - (sp1:x64)
- microsoft windows_7 - (-:x32)
- microsoft windows_7 - (-:x64)
- microsoft windows_server_2003 (sp2)
- microsoft windows_server_2003 (sp2:itanium)
- microsoft windows_server_2003 (sp2:x64)
- microsoft windows_server_2008 r2
- microsoft windows_server_2008 r2 (:itanium)
- microsoft windows_server_2008 r2 (sp1)
- microsoft windows_server_2008 r2 (sp1:itanium)
- microsoft windows_server_2008 r2 (sp1:x64)
- microsoft windows_server_2008 r2 (:x64)
- microsoft windows_server_2008 (sp2)
- microsoft windows_server_2008 - (sp2)
- microsoft windows_server_2008 - (sp2:itanium)
- microsoft windows_server_2008 (sp2:x32)
- microsoft windows_server_2008 (sp2:x64)
- microsoft windows_vista (sp2)
- microsoft windows_vista (sp2:x64)
- microsoft windows_xp - (sp2)
- microsoft windows_xp - (sp2:x64)
- microsoft windows_xp (sp3)
References