CVE-2007-0843

The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:beta1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit_2003:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:professional:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

History

21 Nov 2024, 00:26

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052613.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052613.html -
References () http://osvdb.org/33474 - () http://osvdb.org/33474 -
References () http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html - () http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html -
References () http://secunia.com/advisories/24245 - Vendor Advisory () http://secunia.com/advisories/24245 - Vendor Advisory
References () http://securityreason.com/securityalert/2282 - () http://securityreason.com/securityalert/2282 -
References () http://securityvulns.com/advisories/readdirectorychanges.asp - Vendor Advisory () http://securityvulns.com/advisories/readdirectorychanges.asp - Vendor Advisory
References () http://www.securityfocus.com/archive/1/460887/100/0/threaded - () http://www.securityfocus.com/archive/1/460887/100/0/threaded -
References () http://www.securityfocus.com/archive/1/460899/100/0/threaded - () http://www.securityfocus.com/archive/1/460899/100/0/threaded -
References () http://www.securityfocus.com/bid/22664 - Exploit () http://www.securityfocus.com/bid/22664 - Exploit
References () http://www.vupen.com/english/advisories/2007/0701 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/0701 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/32644 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/32644 -

Information

Published : 2007-02-23 02:28

Updated : 2024-11-21 00:26


NVD link : CVE-2007-0843

Mitre link : CVE-2007-0843

CVE.ORG link : CVE-2007-0843


JSON object : View

Products Affected

microsoft

  • windows_vista
  • windows_2000
  • windows_xp
  • windows_2003_server
CWE
CWE-264

Permissions, Privileges, and Access Controls