Description
The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability."
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2005-2828 | The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability." |
References
History
No history.
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-08-07T22:45:02.287Z
Reserved: 2005-09-07T00:00:00.000Z
Link: CVE-2005-2827
No data.
Status : Modified
Published: 2005-12-14T01:03:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2005-2827
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD