Vulnerability Name:

CVE-2007-0843 (CCN-32644)

Assigned:2007-02-22
Published:2007-02-22
Updated:2021-08-09
Summary:The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information.
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
4.0 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: BugTraq Mailing List, Thu Feb 22 2007 - 04:47:05 CST
Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak

Source: MITRE
Type: CNA
CVE-2007-0843

Source: FULLDISC
Type: UNKNOWN
20070222 Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak

Source: OSVDB
Type: UNKNOWN
33474

Source: CCN
Type: SA24245
Microsoft Windows Directory Monitoring Information Disclosure Weakness

Source: SECUNIA
Type: Vendor Advisory
24245

Source: SREASON
Type: UNKNOWN
2282

Source: MISC
Type: Vendor Advisory
http://securityvulns.com/advisories/readdirectorychanges.asp

Source: CCN
Type: Microsoft Windows Web site
Windows Home Page

Source: CCN
Type: OSVDB ID: 33474
Microsoft Windows ReadDirectoryChangesW API Function File System Information Disclosure

Source: BUGTRAQ
Type: UNKNOWN
20070222 Re[2]: [Full-disclosure] Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak

Source: BUGTRAQ
Type: UNKNOWN
20070222 Microsoft Windows 2000/XP/2003/Vista ReadDirectoryChangesW informaton leak

Source: BID
Type: Exploit
22664

Source: CCN
Type: BID-22664
Microsoft Windows ReadDirectoryChangesW Information Disclosure Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2007-0701

Source: XF
Type: UNKNOWN
win-readdirectory-information-disclosure(32644)

Source: XF
Type: UNKNOWN
win-readdirectory-information-disclosure(32644)

Source: CCN
Type: Packet Storm Security [08-09-2021]
Microsoft Windows Malicious Software Removal Tool Privilege Escalation

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_vista:*:beta1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:gold:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:*:home:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:professional:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:64-bit_2003:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:professional:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_2000:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft windows vista * beta1
    microsoft windows xp * gold
    microsoft windows xp * sp2
    microsoft windows xp * sp2
    microsoft windows 2000 *
    microsoft windows xp *
    microsoft windows xp * sp1
    microsoft windows xp * sp1
    microsoft windows xp * sp1
    microsoft windows xp * sp1
    microsoft windows xp * sp1
    microsoft windows xp * sp1
    microsoft windows xp * sp2
    microsoft windows 2003 server *
    microsoft windows xp * sp2
    microsoft windows 2000
    microsoft windows xp
    microsoft windows 2003_server
    microsoft windows vista