Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API函数输入验证漏洞
Vulnerability Description
Microsoft Windows 2000 SP4 和XP SP2的NTDLL.DLL中的RtlDosPathNameToNtPathName_U API函数未能将DOS样式的路径正确地转换为NT样式的路径,与上下文有关的攻击者可以创建无法通过预期的DOS路径访问的文件,或防止对同一目录内其他有类似名称的文件的访问,从而阻止某些杀毒软件或反间谍软件对这些文件的检测或查杀。
CVSS Information
N/A
Vulnerability Type
N/A