Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-2827Microsoft Windows NT vulnerability

8 documents6 sources
Severity
7.2HIGHNVD
EPSS
2.0%
top 16.15%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 14
Latest updateMay 1

Description

The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability."

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4xxg-53f5-6j6q: The thread termination routine in the kernel for Windows NT 42022-05-01
CVEList
CVE-2005-2827: The thread termination routine in the kernel for Windows NT 42005-12-14

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows Server 2000 Kernel - APC Data-Free Local Escalation (MS05-055)2006-01-05

📋Vendor Advisories

3
Red Hat
perl: File:: Path rmtree race condition (CVE-2005-0448) reintroduced after upstream rebase to 5.8.8-12008-11-19
Red Hat
perl: File:: Path rmtree race condition (CVE-2004-0452) reintroduced after upstream rebase to 5.8.8-12008-11-19
Red Hat
perl: insecure use of chmod in rmtree2008-06-20

💬Community

1
Bugzilla
CVE-2008-2827 perl: insecure use of chmod in rmtree2008-06-24
CVE-2005-2827 — Microsoft Windows NT vulnerability | cvebase