CVE-2006-2334

Microsoft Windows 2000 - Denial of Service

Title source: rule
STIX 2.1

Description

The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Mario Ballano Bárcena · remotewindows
https://www.exploit-db.com/exploits/27851

References (5)

Core 5
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/17934
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/26487
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/433583/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/25761
Exploit, Vendor Advisory x_refsource_misc
http://www.48bits.com/advisories/rtldospath.pdf

Scores

EPSS 0.0319
EPSS Percentile 87.1%

Details

Status published
Products (2)
microsoft/windows_2000
microsoft/windows_xp
Published May 12, 2006
Tracked Since Feb 18, 2026