CVE-2011-0673
Description
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, aka "Win32k Null Pointer De-reference Vulnerability."
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null pointer dereference in win32k.sys on Windows XP SP3 allows local users to gain privileges via a crafted application.
Vulnerability
The vulnerability is a NULL pointer dereference in win32k.sys, the kernel-mode driver subsystem, on Microsoft Windows XP SP3 [1]. It occurs when a crafted application triggers a specific code path that dereferences a NULL pointer, leading to an elevation of privilege condition [1].
Exploitation
An attacker must have valid logon credentials and be able to log on locally to the system [1]. The attacker runs a specially crafted application that triggers the NULL pointer dereference, exploiting the vulnerability [1].
Impact
Successful exploitation allows an attacker to execute arbitrary code in kernel mode, gaining complete control over the system [1]. This includes the ability to install programs, view/change/delete data, or create new accounts with full user rights [1].
Mitigation
Microsoft released security bulletin MS11-034 on April 12, 2011, which addresses this vulnerability [1]. Affected users should apply the security update via Windows Update [1][2]. No workarounds are documented in the available references.
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
- Range: = SP3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- www.us-cert.gov/cas/techalerts/TA11-102A.htmlnvdUS Government Resource
- blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspxnvd
- secunia.com/advisories/44156nvd
- support.avaya.com/css/P8/documents/100133352nvd
- www.securityfocus.com/bid/47234nvd
- www.securitytracker.com/idnvd
- www.vupen.com/english/advisories/2011/0952nvd
- docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/66402nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12546nvd
News mentions
0No linked articles in our index yet.