4/12/2005
8/8/2024
CVE-2005-3981
First published: Sun Dec 04 2005(Updated: )
** DISPUTED ** NOTE: this issue has been disputed by third parties. Microsoft Windows XP, 2000, and 2003 allows local users to kill a writable process by using the CreateRemoteThread function with certain arguments on a process that has been opened using the OpenProcess function, possibly involving an invalid address for the start routine. NOTE: followup posts have disputed this issue, saying that if a user already has privileges to write to a process, then other functions could be called or the process could be terminated using PROCESS_TERMINATE.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2003 Server | =web | |
Microsoft Windows 2003 Server | =enterprise | |
Microsoft Windows XP | =gold | |
Microsoft Windows 2000 | | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows 2003 Server | =r2-sp1 | |
Microsoft Windows 2003 Server | =web-sp1 | |
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | | |
Microsoft Windows 2003 Server | =standard-sp1 | |
Microsoft Windows 2003 Server | =enterprise-sp1 | |
Microsoft Windows 2003 Server | =standard | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows 2000 | =sp3 | |
| | |
| =sp1 | |
| =sp2 | |
| =sp3 | |
| =sp4 | |
| =enterprise | |
| =enterprise-sp1 | |
| =r2 | |
| =r2-sp1 | |
| =standard | |
| =standard-sp1 | |
| =web | |
| =web-sp1 | |
| | |
| | |
| =gold | |
| =sp1 | |
| =sp1 | |
| =sp2 | |
| =sp2 | |
| =sp2 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
- collector/nvd-historical
- collector/nvd-index
- agent/author
- agent/type
- agent/first-publish-date
- agent/weakness
- agent/references
- agent/severity
- agent/status
- agent/softwarecombine
- agent/description
- agent/event
- agent/tags
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- agent/last-modified-date
- collector/mitre-cve
- source/MITRE
- vendor/microsoft
- canonical/microsoft windows xp
- version/microsoft windows xp/sp1
- canonical/microsoft windows 2003 server
- version/microsoft windows 2003 server/web
- version/microsoft windows 2003 server/enterprise
- version/microsoft windows xp/gold
- canonical/microsoft windows 2000
- version/microsoft windows 2000/sp4
- version/microsoft windows xp/sp2
- version/microsoft windows 2000/sp2
- version/microsoft windows 2003 server/r2-sp1
- version/microsoft windows 2003 server/web-sp1
- version/microsoft windows 2000/sp1
- version/microsoft windows 2003 server/standard-sp1
- version/microsoft windows 2003 server/enterprise-sp1
- version/microsoft windows 2003 server/standard
- version/microsoft windows 2003 server/r2
- version/microsoft windows 2000/sp3
- status/disputed
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203