First published: Fri May 12 2006(Updated: )
The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows XP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2334 is classified as a moderate severity vulnerability.
The recommended fix for CVE-2006-2334 is to apply the latest security updates from Microsoft.
CVE-2006-2334 affects Microsoft Windows 2000 SP4 and Windows XP SP2.
CVE-2006-2334 allows context-dependent attackers to create inaccessible files due to improper path conversion.
CVE-2006-2334 is not a remote exploitation vulnerability; it requires local access to the affected system.