[原文]The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.
[CNNVD]Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API函数输入验证漏洞(CNNVD-200605-189)
Microsoft Windows 2000 SP4 和XP SP2的NTDLL.DLL中的RtlDosPathNameToNtPathName_U API函数未能将DOS样式的路径正确地转换为NT样式的路径，与上下文有关的攻击者可以创建无法通过预期的DOS路径访问的文件，或防止对同一目录内其他有类似名称的文件的访问，从而阻止某些杀毒软件或反间谍软件对这些文件的检测或查杀。
Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
Local Access Required
Loss of Integrity
Microsoft Windows contains a flaw that may allow a malicious user to prevent access to files created by them. The issue is triggered when a file with a DOS filename with a trailing space is created. The 'RtlDosPathNameToNtPathName_U()' function in the 'NTDLL.DLL' library does not convert such names into NT path names correctly, meaning that such files cannot be accessed correctly using common system calls, resulting in a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.