CVE-2008-0365

CORE FORCE < 0.95.167 - Buffer Overflow via IOCTL or SSDT Hook Handler

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-0365. PoCs published by Sebastian Gottschalk.

AI-analyzed exploit summary This is a writeup describing steps to reproduce multiple local kernel buffer-overflow vulnerabilities in CORE FORCE Firewall and Registry modules. It involves using DC2.exe and BSODHook.exe tools to trigger the vulnerabilities, potentially leading to denial-of-service or privilege escalation.

Description

Multiple buffer overflows in CORE FORCE before 0.95.172 allow local users to cause a denial of service (system crash) and possibly execute arbitrary code in the kernel context via crafted arguments to (1) IOCTL functions in the Firewall module or (2) SSDT hook handler functions in the Registry module.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Sebastian Gottschalk · textlocalwindows
https://www.exploit-db.com/exploits/31036

This is a writeup describing steps to reproduce multiple local kernel buffer-overflow vulnerabilities in CORE FORCE Firewall and Registry modules. It involves using DC2.exe and BSODHook.exe tools to trigger the vulnerabilities, potentially leading to denial-of-service or privilege escalation.

Classification
Writeup 90%
Attack Type
Dos | Lpe
Complexity
Moderate
Reliability
Theoretical
Target: CORE FORCE Firewall and Registry modules up to and including version 0.95.167
Auth required
Prerequisites: Access to DC2.exe from Windows Driver Kit · Access to BSODHook.exe from Matousec · Local user access to the target system
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (8)

Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27341
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39758
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/486513/100/0/threaded
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/0242
Various Sources x_refsource_confirm
http://www.coresecurity.com/?action=item&id=2025
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3555
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1019245

Scores

EPSS 0.0013
EPSS Percentile 32.2%

Details

CWE
CWE-119
Status published
Products (1)
core_security_technologies/core_force < 0.95.167
Published Jan 18, 2008
Tracked Since Feb 18, 2026