Exploit CORE FORCE Firewall 0.95.167 and Registry Modules - Multiple Local Kernel Buffer Overflow Vulnerabilities

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
31036
Проверка EDB
  1. Пройдено
Автор
SEBASTIAN GOTTSCHALK
Тип уязвимости
LOCAL
Платформа
WINDOWS
CVE
cve-2008-0365
Дата публикации
2008-01-17
Код:
source: https://www.securityfocus.com/bid/27341/info

CORE FORCE Firewall and Registry modules are prone to multiple local kernel buffer-overflow vulnerabilities because the software fails to adequately verify user-supplied input.

Local attackers can exploit these issues to cause denial-of-service conditions. Attackers may also be able to escalate privileges and execute arbitrary code, but this has not been confirmed.

These issues affect versions up to and including CORE FORCE 0.95.167.

All the vulnerabilities can be reproduced by running a combination of
DC2 and BSODHook tools.

Step by step instructions:

- Get DC2.exe (Driver Path Verifier) from the latest Windows Driver Kit.

- Login as unprivileged user.

- Run "dc2 /hct /a".

- Get BSODHook.exe from Matousec 
http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php

- Click on "Load Driver" then click on "Find SSDT hooks" then "Add to
probe list" and then "GO".
 
Источник
www.exploit-db.com

Похожие темы