[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2005-2827Date: (C)2005-12-13   (M)2023-12-22


The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.2
Exploit Score: 3.9
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1015347
SECUNIA-15821
BID-15826
SECUNIA-18064
SECUNIA-18311
OSVDB-18823
http://www.securityfocus.com/archive/1/419377/100/0/threaded
SREASON-252
ADV-2005-2868
ADV-2005-2909
EEYEB-20051213
MS05-055
http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf
http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420
oval:org.mitre.oval:def:1583
win-apc-gain-privileges(23447)

CPE    6
cpe:/o:microsoft:windows_2000::sp3
cpe:/o:microsoft:windows_2000::sp4
cpe:/o:microsoft:windows_2000
cpe:/o:microsoft:windows_2000::sp1
...
OVAL    1
oval:org.mitre.oval:def:1583

© SecPod Technologies