Search
Report Types:
Products
Updates
Logs
Bugs
Files
Encounters:
Only Reports that have Encounters
Encounters must contain resolution
Home
Products
Updates
Logs
Bugs
Files
Sign In
Create an Account
Action Links
Create a Product Report
Create a Update/Patch Report
Create a Log/Event Report
Create a Bug Report
Create a File Report
Recent Search Results
No Search results are currently available to display.
Your last search results will be displayed here for the duration of your browser session.
Latest Reports
GroupPolicy Error GroupPolicy 7016
Intel WiFi 1000 BGN
Windows cannot find the local profile
Windows System Event ID 333, Application Popup, Error
test test update test
test test test
test file Information
Dell test test 1 test 1 test
test Information
test
1
2
3
4
5
...
Update Report
Print
Edit This Record
Create New
Revision
1
Name
KB2393802
Type
Important
Average Threat Rating
Average Threat Rating Help
X
Loading...
Encounters
More Info
Related Content
Alert Me
Discuss
Version
Security
Release Date
2/11/2011
Summary
Microsoft Security Bulletin MS11-011 - Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2393802)
Details
Executive Summary
This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users.
This security update is rated Important for all supported versions of Microsoft Windows. For more information, see the subsection, Affected and Non-Affected Software, in this section.
The security update addresses the vulnerabilities by ensuring that the Windows kernel properly validates user-supplied data before allocating memory. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.
Recommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.
Notes
Copyright (c) 2011
About Us
Contact Us
Privacy
Disclaimer
FAQs