First published: Wed Jul 13 2011(Updated: )
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3 does not properly validate the arguments to functions, which allows local users to read arbitrary data from kernel memory via a crafted application that triggers a NULL pointer dereference, aka "Win32k Incorrect Parameter Validation Allows Information Disclosure Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1886 has a moderate severity rating due to its potential to allow local users to read kernel memory.
To fix CVE-2011-1886, apply the latest security updates and patches provided by Microsoft for Windows XP SP3.
CVE-2011-1886 affects local users of Microsoft Windows XP Service Pack 3.
The potential impacts of CVE-2011-1886 include unauthorized access to sensitive kernel memory data.
CVE-2011-1886 cannot be exploited remotely; it requires local access to the vulnerable system.