CVE-2006-2334

The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://www.48bits.com/advisories/rtldospath.pdf - Exploit, Vendor Advisory () http://www.48bits.com/advisories/rtldospath.pdf - Exploit, Vendor Advisory
References () http://www.osvdb.org/25761 - () http://www.osvdb.org/25761 -
References () http://www.securityfocus.com/archive/1/433583/100/0/threaded - () http://www.securityfocus.com/archive/1/433583/100/0/threaded -
References () http://www.securityfocus.com/bid/17934 - Exploit () http://www.securityfocus.com/bid/17934 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26487 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26487 -

Information

Published : 2006-05-12 00:02

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2334

Mitre link : CVE-2006-2334

CVE.ORG link : CVE-2006-2334


JSON object : View

Products Affected

microsoft

  • windows_xp
  • windows_2000