7.2
CVSSv2

CVE-2006-0008

CVSSv4: NA | CVSSv3: NA | CVSSv2: 7.2 | VMScore: 820 | EPSS: 0.04112 | KEV: Not Included
Published: 14/02/2006 Updated: 21/11/2024

Vulnerability Summary

The ShellAbout API call in Korean Input Method Editor (IME) in Korean versions of Microsoft Windows XP SP1 and SP2, Windows Server 2003 up to SP1, and Office 2003, allows local users to gain privileges by launching the "shell about dialog box" and clicking the "End-User License Agreement" link, which executes Notepad with the privileges of the program that displays the about box.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft office 2003

microsoft windows 2003 server datacenter 64-bit

microsoft windows 2003 server enterprise

microsoft windows 2003 server enterprise 64-bit

microsoft windows 2003 server r2

microsoft windows 2003 server standard

microsoft windows 2003 server standard 64-bit

microsoft windows 2003 server web

microsoft windows xp

References

CWE-264https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/739844https://www.first.org/epsshttp://secunia.com/advisories/18859http://securitytracker.com/id?1015631http://www.kb.cert.org/vuls/id/739844http://www.ryanstyle.com/alert/my/5/ms06_009_eng.htmlhttp://www.securityfocus.com/archive/1/425141/100/0/threadedhttp://www.securityfocus.com/bid/16643http://www.vupen.com/english/advisories/2006/0578https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-009https://exchange.xforce.ibmcloud.com/vulnerabilities/24492https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1595https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1650https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1664https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1688https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A727http://secunia.com/advisories/18859http://securitytracker.com/id?1015631http://www.kb.cert.org/vuls/id/739844http://www.ryanstyle.com/alert/my/5/ms06_009_eng.htmlhttp://www.securityfocus.com/archive/1/425141/100/0/threadedhttp://www.securityfocus.com/bid/16643http://www.vupen.com/english/advisories/2006/0578https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-009https://exchange.xforce.ibmcloud.com/vulnerabilities/24492https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1595https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1650https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1664https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1688https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A727