Vulnerability CVE-2008-0366


Published: 2008-01-18   Modified: 2012-02-12

Description:
CORE FORCE before 0.95.172 does not properly validate arguments to SSDT hook handler functions in the Registry module, which allows local users to cause a denial of service (system crash) and possibly execute arbitrary code in the kernel context via crafted arguments.

See advisories in our WLB2 database:
Topic
Author
Date
High
CORE FORCE Kernel Buffer Overflow
CORE STA
21.01.2008

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Core security technologies -> Core force 

 References:
http://force.coresecurity.com/index.php?module=articles&func=display&aid=32
http://securityreason.com/securityalert/3555
http://www.coresecurity.com/?action=item&id=2025
http://www.securityfocus.com/archive/1/486513/100/0/threaded
http://www.securityfocus.com/bid/27341
http://www.securitytracker.com/id?1019245
http://www.vupen.com/english/advisories/2008/0242

Copyright 2024, cxsecurity.com

 

Back to Top