CORE FORCE Firewall and Registry modules Local Kernel Buffer-Overflow Vulnerabilities
CORE FORCE Firewall and Registry modules are prone to multiple local kernel buffer-overflow vulnerabilities because the software fails to adequately verify user-supplied input. Local attackers can exploit these issues to cause denial-of-service conditions. Attackers may also be able to escalate privileges and execute arbitrary code, but this has not been confirmed. All the vulnerabilities can be reproduced by running a combination of DC2 and BSODHook tools. Step by step instructions: Get DC2.exe (Driver Path Verifier) from the latest Windows Driver Kit. Login as unprivileged user. Run 'dc2 /hct /a'. Get BSODHook.exe from Matousec http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php Click on 'Load Driver' then click on 'Find SSDT hooks' then 'Add to probe list' and then 'GO'. BSODHook will crash the system.