MS11-011: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2393802)

high Nessus Plugin ID 51911


The Windows kernel is affected by several vulnerabilities that could allow escalation of privileges.


The remote Windows host is running a version of the Windows kernel that is affected by one or more of the following vulnerabilities :

- A buffer overflow in the 'GreEnableEUDC()' function can be triggered using specially crafted end-user-defined characters (EUDC) registry key values. (CVE-2010-4398)

- An integer truncation vulnerability exists due to the failure of the Windows kernel to validate user-supplied data before allocating memory. (CVE-2011-0045)

An attacker with local access to the affected system can exploit these issues to execute arbitrary code in kernel mode and take complete control of the affected system.


Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.

See Also

Plugin Details

Severity: High

ID: 51911

File Name: smb_nt_ms11-011.nasl

Version: 1.27

Type: local

Agent: windows

Published: 2/8/2011

Updated: 10/11/2023

Supported Sensors: Nessus

Risk Information


Risk Factor: Critical

Score: 9.0


Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2011-0045

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/8/2011

Vulnerability Publication Date: 11/24/2010

CISA Known Exploited Vulnerability Due Dates: 4/21/2022

Exploitable With


Core Impact

Reference Information

CVE: CVE-2010-4398, CVE-2011-0045

BID: 45045, 46136

CERT: 529673

IAVA: 2011-A-0022-S

MSFT: MS11-011

MSKB: 2393802