Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-2334

Overview

Vulnerability Score 2.1 2.1
CVE Id CVE-2006-2334
Last Modified 05 Sep 2008 05:04:16
Published 11 May 2006 08:02:00
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2006-2334

Summary

The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.

Vulnerable Systems

Operating System

  • Microsoft Windows 2000

  • Microsoft Windows Xp


References

BID - 17934

BUGTRAQ - 20060509 [48Bits.com Advisory] Path conversion design flaw in Microsoft NTDLL

MISC - http://www.48bits.com/advisories/rtldospath.pdf

XF - win-ntdll-path-conversion(26487)

OSVDB - 25761


Last Updated: 27 May 2016 10:42:26