Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-2334


Vulnerability Score 2.1 2.1
CVE Id CVE-2006-2334
Last Modified 05 Sep 2008 05:04:16
Published 11 May 2006 08:02:00
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector LOCAL
Access Complexity LOW
Authentication NONE



The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.

Vulnerable Systems

Operating System

  • Microsoft Windows 2000

  • Microsoft Windows Xp


BID - 17934

BUGTRAQ - 20060509 [ Advisory] Path conversion design flaw in Microsoft NTDLL


XF - win-ntdll-path-conversion(26487)

OSVDB - 25761

Last Updated: 27 May 2016 10:42:26