The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability."
- http://securityreason.com/securityalert/252
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-055
No PoCs found on GitHub currently.