Vulnerability Description
CORE FORCE before 0.95.172 does not properly validate arguments to SSDT hook handler functions in the Registry module, which allows local users to cause a denial of service (system crash) and possibly execute arbitrary code in the kernel context via crafted arguments.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Core Security Technologies | Core Force | <= 0.95.167 |
Related Weaknesses (CWE)
References
- http://force.coresecurity.com/index.php?module=articles&func=display&aid=32
- http://securityreason.com/securityalert/3555
- http://www.coresecurity.com/?action=item&id=2025Patch
- http://www.securityfocus.com/archive/1/486513/100/0/threaded
- http://www.securityfocus.com/bid/27341ExploitPatch
- http://www.securitytracker.com/id?1019245
- http://www.vupen.com/english/advisories/2008/0242
- http://force.coresecurity.com/index.php?module=articles&func=display&aid=32
- http://securityreason.com/securityalert/3555
- http://www.coresecurity.com/?action=item&id=2025Patch
- http://www.securityfocus.com/archive/1/486513/100/0/threaded
- http://www.securityfocus.com/bid/27341ExploitPatch
- http://www.securitytracker.com/id?1019245
- http://www.vupen.com/english/advisories/2008/0242
FAQ
What is CVE-2008-0366?
CVE-2008-0366 is a vulnerability with a CVSS score of 7.2 (HIGH). CORE FORCE before 0.95.172 does not properly validate arguments to SSDT hook handler functions in the Registry module, which allows local users to cause a denial of service (system crash) and possibly...
How severe is CVE-2008-0366?
CVE-2008-0366 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0366?
Check the references section above for vendor advisories and patch information. Affected products include: Core Security Technologies Core Force.