CORE FORCE before 0.95.172 does not properly validate arguments to SSDT hook handler functions in the Registry module, which allows local users to cause a denial of service (system crash) and possibly execute arbitrary code in the kernel context via crafted arguments.
force.coresecurity.com/index.php?module=articles&func=display&aid=32
securityreason.com/securityalert/3555
www.coresecurity.com/?action=item&id=2025
www.securityfocus.com/archive/1/486513/100/0/threaded
www.securityfocus.com/bid/27341
www.securitytracker.com/id?1019245
www.vupen.com/english/advisories/2008/0242