CORE FORCE before 0.95.172 does not properly validate arguments to SSDT hook handler functions in the Registry module, which allows local users to cause a denial of service (system crash) and possibly execute arbitrary code in the kernel context via crafted arguments.
References
Configurations
History
21 Nov 2024, 00:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://force.coresecurity.com/index.php?module=articles&func=display&aid=32 - | |
References | () http://securityreason.com/securityalert/3555 - | |
References | () http://www.coresecurity.com/?action=item&id=2025 - Patch | |
References | () http://www.securityfocus.com/archive/1/486513/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/27341 - Exploit, Patch | |
References | () http://www.securitytracker.com/id?1019245 - | |
References | () http://www.vupen.com/english/advisories/2008/0242 - |
Information
Published : 2008-01-18 23:00
Updated : 2024-11-21 00:41
NVD link : CVE-2008-0366
Mitre link : CVE-2008-0366
CVE.ORG link : CVE-2008-0366
JSON object : View
Products Affected
core_security_technologies
- core_force
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer