CVE-2006-2334
CVSS2.1
发布时间 :2006-05-11 20:02:00
修订时间 :2008-09-05 17:04:16
NMCO    

[原文]The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.


[CNNVD]Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API函数输入验证漏洞(CNNVD-200605-189)

        Microsoft Windows 2000 SP4 和XP SP2的NTDLL.DLL中的RtlDosPathNameToNtPathName_U API函数未能将DOS样式的路径正确地转换为NT样式的路径,与上下文有关的攻击者可以创建无法通过预期的DOS路径访问的文件,或防止对同一目录内其他有类似名称的文件的访问,从而阻止某些杀毒软件或反间谍软件对这些文件的检测或查杀。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_xp::sp2:tablet_pcMicrosoft windows xp_sp2 tablet_pc
cpe:/o:microsoft:windows_2000::sp4::fr

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2334
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2334
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-189
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/17934
(UNKNOWN)  BID  17934
http://www.securityfocus.com/archive/1/archive/1/433583/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060509 [48Bits.com Advisory] Path conversion design flaw in Microsoft NTDLL
http://www.48bits.com/advisories/rtldospath.pdf
(VENDOR_ADVISORY)  MISC  http://www.48bits.com/advisories/rtldospath.pdf
http://xforce.iss.net/xforce/xfdb/26487
(UNKNOWN)  XF  win-ntdll-path-conversion(26487)
http://www.osvdb.org/25761
(UNKNOWN)  OSVDB  25761

- 漏洞信息

Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API函数输入验证漏洞
低危 设计错误
2006-05-11 00:00:00 2006-05-12 00:00:00
远程  
        Microsoft Windows 2000 SP4 和XP SP2的NTDLL.DLL中的RtlDosPathNameToNtPathName_U API函数未能将DOS样式的路径正确地转换为NT样式的路径,与上下文有关的攻击者可以创建无法通过预期的DOS路径访问的文件,或防止对同一目录内其他有类似名称的文件的访问,从而阻止某些杀毒软件或反间谍软件对这些文件的检测或查杀。

- 公告与补丁

        暂无数据

- 漏洞信息

25761
Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
Local Access Required Input Manipulation
Loss of Integrity Solution Unknown

- 漏洞描述

Microsoft Windows contains a flaw that may allow a malicious user to prevent access to files created by them. The issue is triggered when a file with a DOS filename with a trailing space is created. The 'RtlDosPathNameToNtPathName_U()' function in the 'NTDLL.DLL' library does not convert such names into NT path names correctly, meaning that such files cannot be accessed correctly using common system calls, resulting in a loss of integrity.

- 时间线

2006-05-10 Unknow
2006-05-09 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站