CVE-2007-0843

medium

Description

The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/32644

http://www.vupen.com/english/advisories/2007/0701

http://www.securityfocus.com/archive/1/460899/100/0/threaded

http://www.securityfocus.com/archive/1/460887/100/0/threaded

http://securityvulns.com/advisories/readdirectorychanges.asp

http://securityreason.com/securityalert/2282

http://secunia.com/advisories/24245

http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html

http://osvdb.org/33474

http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052613.html

Details

Source: Mitre, NVD

Published: 2007-02-23

Updated: 2021-08-09

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Severity: Medium