search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Windows Kernel Vulnerability

Vulnerability Note VU#775933

Original Release Date: 2005-04-13 | Last Revised: 2005-04-14


A privilege elevation vulnerability exists in the way that the Windows' kernel processes certain access requests. This vulnerability could allow a logged on user to take complete control of the system.


A locally authenticated user could potentially exploit a vulnerability in the way that the Windows' kernel processes certain access requests. Microsoft indicates that this vulnerability could not be exploited remotely. For more information see the Microsoft bulletin MS05-018.


A locally authenticated user could potentially execute arbitrary code with elevated privileges allowing them to gain complete control of the system.


Apply a patch

Microsoft has published Microsoft Security Bulletin MS05-018 in response to this issue. Users are strongly encouraged to review this advisory and apply the patches it refers to.

Vendor Information


Microsoft Corporation Affected

Updated:  April 13, 2005



Vendor Statement

For more information please see Microsoft bulletin MS05-018 available at:

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


US-CERT has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to Microsoft who in turn thank Sanjeev Radhakrishnan, Amit Joshi, and Ananta Iyengar with GreenBorder Technologies for reporting the Windows Kernel Vulnerability

This document was written by Robert Mead based on information provided by Microsoft.

Other Information

CVE IDs: CVE-2005-0061
Severity Metric: 2.43
Date Public: 2005-04-12
Date First Published: 2005-04-13
Date Last Updated: 2005-04-14 14:21 UTC
Document Revision: 14

Sponsored by CISA.