cpe:/a:core_security_technologies:core_force:0.95.167 CVE-2008-0366 2008-01-18T18:00:00.000-05:00 2011-03-07T22:04:23.580-05:00 7.2 LOCAL LOW NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2008-01-21T09:53:00.000-05:00 SECTRACK 1019245 BUGTRAQ 20080117 CORE-2007-1119: CORE FORCE Kernel Buffer Overflow BID 27341 SREASON 3555 VUPEN ADV-2008-0242 CONFIRM http://force.coresecurity.com/index.php?module=articles&func=display&aid=32 CONFIRM http://www.coresecurity.com/?action=item&id=2025 CORE FORCE before 0.95.172 does not properly validate arguments to SSDT hook handler functions in the Registry module, which allows local users to cause a denial of service (system crash) and possibly execute arbitrary code in the kernel context via crafted arguments.