VYPR
Unrated severityNVD Advisory· Published Oct 12, 2011· Updated Apr 29, 2026

CVE-2011-2011

CVE-2011-2011

Description

Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, aka "Win32k Use After Free Vulnerability."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in win32k.sys allows local privilege escalation via crafted app; affects Windows XP SP2-SP3, 2003 SP2, Vista SP2, 2008 SP2/R2, and 7 Gold/SP1.

Vulnerability

A use-after-free vulnerability exists in the win32k.sys kernel-mode driver component of Microsoft Windows. The flaw is triggered by incorrect driver object management when processing specially crafted input from user mode. This allows a local attacker to reference memory after it has been freed, leading to arbitrary code execution in kernel context. Affected versions include Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 [1].

Exploitation

To exploit this vulnerability, an attacker must have valid local logon credentials and the ability to execute a crafted application. The attacker runs the application, which leverages the use-after-free condition by manipulating kernel-mode driver object lifetimes. No user interaction beyond executing the malicious program is required; the attacker can be an unprivileged user [1].

Impact

Successful exploitation grants the attacker elevated privileges, allowing them to run arbitrary code in kernel mode. This results in complete compromise of the affected system: the attacker can install programs, view, change, or delete data, and create new accounts with full user rights [1].

Mitigation

Microsoft released security update MS11-077 on October 11, 2011, which addresses this vulnerability. Users should apply the update via Windows Update or by manually installing the patch. No workarounds are provided in the bulletin, but disabling automatic execution of font files on network shares may reduce the risk for related attack vectors [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

14
  • cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*+ 4 more
    • cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*+ 1 more
    • cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.