U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2011-1229

Change History

Modified Analysis by NIST 2/27/2019 8:32:24 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:avaya:agent_access:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:aura_conferencing_standard_edition:6.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:basic_call_management_system_reporting_desktop:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:call_management_server_supervisor:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:callpilot:*:*:*:*:*:*:*:* versions from (including) 4.0.x up to (including) 5.0.x
     *cpe:2.3:a:avaya:callvisor_asai_lan:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:communication_server_1000_telephony_manager:*:*:*:*:*:*:*:* versions from (including) 3.0.0 up to (including) 4.0.0
     *cpe:2.3:a:avaya:computer_telephony:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:contact_center_express:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:customer_interaction_express:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:enterprise_manager:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:interaction_center:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:ip_agent:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:ip_softphone:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:meeting_exchange:*:*:*:*:*:*:*:* versions from (including) 5.0.0 up to (including) 5.2.0
     *cpe:2.3:a:avaya:messaging_application_server:*:*:*:*:*:*:*:* versions from (including) 4.0.x up to (including) 5.2.x
     *cpe:2.3:a:avaya:network_reporting:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:octelaccess\(r\)_server:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:octeldesignertm:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:operational_analyst:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:outbound_contact_management:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:speech_access:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:unified_communication_center:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:unified_messenger_\(r\):*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:visual_messenger_tm:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:visual_vector_client:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:vpnmanagertm_console:*:*:*:*:*:*:*:*
     *cpe:2.3:a:avaya:web_messenger:*:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:itanium:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:x64:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
OR
     *cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
     *cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
     *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
     *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
     *cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*
     *cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:x64:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
Changed Reference Type
http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx No Types Assigned
http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx Vendor Advisory
Changed Reference Type
http://osvdb.org/71735 No Types Assigned
http://osvdb.org/71735 Broken Link
Changed Reference Type
http://secunia.com/advisories/44156 No Types Assigned
http://secunia.com/advisories/44156 Third Party Advisory
Changed Reference Type
http://support.avaya.com/css/P8/documents/100133352 No Types Assigned
http://support.avaya.com/css/P8/documents/100133352 Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/47229 No Types Assigned
http://www.securityfocus.com/bid/47229 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1025345 No Types Assigned
http://www.securitytracker.com/id?1025345 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.us-cert.gov/cas/techalerts/TA11-102A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA11-102A.html Third Party Advisory, US Government Resource
Changed Reference Type
http://www.vupen.com/english/advisories/2011/0952 No Types Assigned
http://www.vupen.com/english/advisories/2011/0952 Broken Link
Changed Reference Type
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034 No Types Assigned
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034 Patch, Vendor Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/66411 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/66411 VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12503 Third Party Advisory