The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2005-12-14 01:03
Updated : 2024-02-04 16:52
NVD link : CVE-2005-2827
Mitre link : CVE-2005-2827
CVE.ORG link : CVE-2005-2827
JSON object : View
Products Affected
microsoft
- windows_2000
- windows_nt
CWE