The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability."
2005-12-14T01:03:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.2 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | microsoft | windows_2000 | * | Yes |
| Operating System | microsoft | windows_2000 | * | Yes |
| Operating System | microsoft | windows_2000 | * | Yes |
| Operating System | microsoft | windows_2000 | * | Yes |
| Operating System | microsoft | windows_2000 | * | Yes |
| Operating System | microsoft | windows_nt | 4.0 | Yes |