Windows Kernel Crash in nt!RtlValidRelativeSecurityDescriptor Function
We have encountered a Windows kernel crash in the nt!RtlValidRelativeSecurityDescriptor function invoked by nt!CmpValidateHiveSecurityDescriptors while loading corrupted registry hive files. An example of a crash log excerpt generated after triggering the bug is shown below:---KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)This is a very common bugcheck. Usually the exception address pinpointsthe driver/function that caused the problem. Always note this addressas well as the link date of the driver/image that contains this address.Some common problems are exception code 0x80000003. This means a hardcoded breakpoint or assertion was hit, but this system was booted/NODEBUG. This is not supposed to happen as developers should never havehardcoded breakpoints in retail code, but ...If this happens, make sure a debugger gets connected, and thesystem is booted /DEBUG. This will let us see why this breakpoint ishappening.Arguments:Arg1: c0000005, The exception code that was not handledArg2: 81815974, The address that the exception occurred atArg3: 80795644, Trap FrameArg4: 00000000Debugging Details:------------------[...]STACK_TEXT:807956c4 81814994 a4f3f098 0125ffff 00000000 nt!RtlValidRelativeSecurityDescriptor+0x5b807956fc 818146ad 03010001 80795728 80795718 nt!CmpValidateHiveSecurityDescriptors+0x24b8079573c 8181708f 03010001 80000560 80000540 nt!CmCheckRegistry+0xd880795798 817eafa0 80795828 00000002 00000000 nt!CmpInitializeHive+0x55c8079585c 817ebd85 80795bb8 00000000 807959f4 nt!CmpInitHiveFromFile+0x1be807959c0 817f3aae 80795bb8 80795a88 80795a0c nt!CmpCmdHiveOpen+0x5080795acc 817ec3b8 80795b90 80795bb8 00000010 nt!CmLoadKey+0x45980795c0c 81682dc6 002afc90 00000000 00000010 nt!NtLoadKeyEx+0x56c80795c0c 77066bf4 002afc90 00000000 00000010 nt!KiSystemServicePostCallWARNING: Frame IP not in any known module. Following frames may be wrong.002afcf8 00000000 000