Computer Security
[EN] securityvulns.ru
no-pyccku

  

Microsoft Windows ReadDirectoryChangesW information leak
Published:22.02.2007
Source:SECURITYVULNS
SecurityVulns ID:7283
Type:remote
Level:6/10
Description:ReadDirectoryChangesW() API function doesn't check user's privileges for subtree folders, making it's possible for unprivileged user to gather information about sensitive files.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
CVE:CVE-2007-0843 (The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information.)
Original documentdocument3APA3A, Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak (22.02.2007)
Files:Monitors directory tree changes (compiled)
 Monitors directory tree changes
 Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod

 
 



Rating@Mail.ru