Windows ntdll.dll Library Function Vulnerability
The Windows library ntdll.dll includes a function that does not perform sufficient bounds checking. The vulnerability is present in the function 'RtlDosPathNameToNtPathName_U' and may be exploited through other programs that use the library if an attack vector permits it. One of these programs is the implementation of WebDAV that ships with IIS 5.0. The vector allows for the vulnerability in ntdll.dll to be exploited by a remote attacker. Several other library functions which call the vulnerable ntdll.dll procedure have been identified. Reports suggest that numerous hosts have been scanned in an attempt to exploit this vulnerability. It has been reported that this vulnerability is also present in the 'RtlGetFullPathName_U' function. It has been reported that the W32.Welchia.Worm, described in MCID 1811, is actively exploiting this vulnerability.