VYPR
Unrated severityNVD Advisory· Published Apr 13, 2011· Updated Apr 29, 2026

CVE-2011-0673

CVE-2011-0673

Description

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, aka "Win32k Null Pointer De-reference Vulnerability."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null pointer dereference in win32k.sys on Windows XP SP3 allows local users to gain privileges via a crafted application.

Vulnerability

The vulnerability is a NULL pointer dereference in win32k.sys, the kernel-mode driver subsystem, on Microsoft Windows XP SP3 [1]. It occurs when a crafted application triggers a specific code path that dereferences a NULL pointer, leading to an elevation of privilege condition [1].

Exploitation

An attacker must have valid logon credentials and be able to log on locally to the system [1]. The attacker runs a specially crafted application that triggers the NULL pointer dereference, exploiting the vulnerability [1].

Impact

Successful exploitation allows an attacker to execute arbitrary code in kernel mode, gaining complete control over the system [1]. This includes the ability to install programs, view/change/delete data, or create new accounts with full user rights [1].

Mitigation

Microsoft released security bulletin MS11-034 on April 12, 2011, which addresses this vulnerability [1]. Affected users should apply the security update via Windows Update [1][2]. No workarounds are documented in the available references.

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.