CVE-2005-2827
Currently unrated
Summary
The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability."
References
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database