The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/bid/22664 | vdb-entry x_refsource_BID |
| http://securityvulns.com/advisories/readdirectorychanges.asp | x_refsource_MISC |
| http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052613.html | mailing-list x_refsource_FULLDISC |
| http://secunia.com/advisories/24245 | third-party-advisory x_refsource_SECUNIA |
| http://www.securityfocus.com/archive/1/460899/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://www.vupen.com/english/advisories/2007/0701 | vdb-entry x_refsource_VUPEN |
| http://osvdb.org/33474 | vdb-entry x_refsource_OSVDB |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/32644 | vdb-entry x_refsource_XF |
| http://www.securityfocus.com/archive/1/460887/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://securityreason.com/securityalert/2282 | third-party-advisory x_refsource_SREASON |
| http://packetstormsecurity.com/files/163755/Microsoft-Windows-Malicious-Software-Removal-Tool-Privilege-Escalation.html | x_refsource_MISC |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|