Vulnerability Description
The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 2000 | All versions |
| Microsoft | Windows Nt | 4.0 |
References
- http://secunia.com/advisories/15821PatchVendor Advisory
- http://secunia.com/advisories/18064
- http://secunia.com/advisories/18311
- http://securityreason.com/securityalert/252
- http://securitytracker.com/id?1015347
- http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf
- http://www.eeye.com/html/research/advisories/AD20051213.html
- http://www.osvdb.org/18823
- http://www.securityfocus.com/archive/1/419377/100/0/threaded
- http://www.securityfocus.com/bid/15826Patch
- http://www.vupen.com/english/advisories/2005/2868
- http://www.vupen.com/english/advisories/2005/2909
- http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&Docu
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-05
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23447
FAQ
What is CVE-2005-2827?
CVE-2005-2827 is a vulnerability with a CVSS score of 7.2 (HIGH). The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asy...
How severe is CVE-2005-2827?
CVE-2005-2827 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2827?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 2000, Microsoft Windows Nt.