vendor:
Windows NT, Windows XP
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Windows NT, Windows XP
Affected Version From: Windows NT, Windows XP
Affected Version To: Windows NT, Windows XP
Patch Exists: YES
Related CWE: CVE-2002-0392
CPE: o:microsoft:windows_nt
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2002
Windows ntdll.dll Library Function Bounds Checking Vulnerability
The Windows library ntdll.dll includes a function that does not perform sufficient bounds checking. The vulnerability is present in the function 'RtlDosPathNameToNtPathName_U' and may be exploited through other programs that use the library if an attack vector permits it. One of these programs is the implementation of WebDAV that ships with IIS 5.0. The vector allows for the vulnerability in ntdll.dll to be exploited by a remote attacker. Several other library functions which call the vulnerable ntdll.dll procedure have been identified. It has been reported that the W32.Welchia.Worm, described in MCID 1811, is actively exploiting this vulnerability.
Mitigation:
Administrators are advised to patch as other attack vectors are likely to surface.