CVE-2006-2334

N/A Unknown
Published: May 12, 2006 Modified: April 16, 2026
View on NVD

Description

The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.48bits.com/advisories/rtldospath.pdf
Source: cve@mitre.org
Exploit Vendor Advisory
http://www.osvdb.org/25761
Source: cve@mitre.org
http://www.securityfocus.com/bid/17934
Source: cve@mitre.org
Exploit
http://www.48bits.com/advisories/rtldospath.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://www.osvdb.org/25761
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/433583/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17934
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/26487
Source: af854a3a-2127-422b-91ae-364da2661108

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
3.2%
87th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

microsoft