Vulnerability Description
The process scheduler in the Microsoft Windows XP kernel does not make use of the process statistics kept by the kernel, performs scheduling based on CPU billing gathered from periodic process sampling ticks, and gives preference to "interactive" processes that perform voluntary sleeps, which allows local users to cause a denial of service (CPU consumption), as described in "Secretly Monopolizing the CPU Without Superuser Privileges."
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows Xp | All versions |
References
- http://osvdb.org/36938
- http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
- http://osvdb.org/36938
- http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
FAQ
What is CVE-2007-3724?
CVE-2007-3724 is a vulnerability with a CVSS score of 2.1 (LOW). The process scheduler in the Microsoft Windows XP kernel does not make use of the process statistics kept by the kernel, performs scheduling based on CPU billing gathered from periodic process samplin...
How severe is CVE-2007-3724?
CVE-2007-3724 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3724?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows Xp.