Description
The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Mario Ballano Bárcena · remotewindows
https://www.exploit-db.com/exploits/27851
References (5)
Core 5
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17934
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/26487
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/433583/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/25761
Exploit, Vendor Advisory x_refsource_misc
http://www.48bits.com/advisories/rtldospath.pdf
Scores
EPSS
0.0319
EPSS Percentile
87.1%
Details
Status
published
Products (2)
microsoft/windows_2000
microsoft/windows_xp
Published
May 12, 2006
Tracked Since
Feb 18, 2026