Vulnerabilities > CVE-2005-2827 - Local Privilege Escalation vulnerability in Microsoft Windows 2000 and Windows NT
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 6 |
Exploit-Db
description | MS Windows 2k Kernel APC Data-Free Local Escalation Exploit (MS05-055). CVE-2005-2827. Local exploit for windows platform |
id | EDB-ID:1407 |
last seen | 2016-01-31 |
modified | 2006-01-05 |
published | 2006-01-05 |
reporter | SoBeIt |
source | https://www.exploit-db.com/download/1407/ |
title | Microsoft Windows 2000 - Kernel APC Data-Free Local Escalation Exploit MS05-055 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-055.NASL |
description | The remote host contains a version of the Windows kernel that may allow a local user to elevate his privileges or to crash it (therefore causing a denial of service). |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20298 |
published | 2005-12-13 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20298 |
title | MS05-055: Vulnerability in Windows Kernel Could Allow Elevation of Privilege (908523) |
code |
|
Oval
accepted | 2011-05-09T04:01:15.331-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
description | The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability." | ||||||||||||
family | windows | ||||||||||||
id | oval:org.mitre.oval:def:1583 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2005-12-13T12:00:00.000-04:00 | ||||||||||||
title | Win2K Kernel Privilege Escalation Vulnerability | ||||||||||||
version | 68 |
References
- http://secunia.com/advisories/15821
- http://secunia.com/advisories/18064
- http://secunia.com/advisories/18311
- http://securityreason.com/securityalert/252
- http://securitytracker.com/id?1015347
- http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf
- http://www.eeye.com/html/research/advisories/AD20051213.html
- http://www.osvdb.org/18823
- http://www.securityfocus.com/archive/1/419377/100/0/threaded
- http://www.securityfocus.com/bid/15826
- http://www.vupen.com/english/advisories/2005/2868
- http://www.vupen.com/english/advisories/2005/2909
- http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-055
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23447
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1583