CVE-2005-2827

Windows NT 4.0-2000 - Memory Corruption

Title source: llm

Description

The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability."

Exploits (1)

exploitdb WORKING POC VERIFIED
by SoBeIt · clocalwindows
https://www.exploit-db.com/exploits/1407

Scores

EPSS 0.0204
EPSS Percentile 83.9%

Details

Status published
Products (2)
microsoft/windows_2000 (5 CPE variants)
microsoft/windows_nt 4.0
Published Dec 14, 2005
Tracked Since Feb 18, 2026