CVE-2006-0008
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-264
Permisos, privilegios y/o control de acceso
Fecha de publicación:
14/02/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** The ShellAbout API call in Korean Input Method Editor (IME) in Korean versions of Microsoft Windows XP SP1 and SP2, Windows Server 2003 up to SP1, and Office 2003, allows local users to gain privileges by launching the "shell about dialog box" and clicking the "End-User License Agreement" link, which executes Notepad with the privileges of the program that displays the about box.
Impacto
Puntuación base 2.0
7.20
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:datacenter_64-bit:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:r2:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/18859
- http://securitytracker.com/id?1015631=
- http://www.kb.cert.org/vuls/id/739844
- http://www.ryanstyle.com/alert/my/5/ms06_009_eng.html
- http://www.securityfocus.com/archive/1/425141/100/0/threaded
- http://www.securityfocus.com/bid/16643
- http://www.vupen.com/english/advisories/2006/0578
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-009
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24492
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1595
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1650
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1664
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1688
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A727
- http://secunia.com/advisories/18859
- http://securitytracker.com/id?1015631=
- http://www.kb.cert.org/vuls/id/739844
- http://www.ryanstyle.com/alert/my/5/ms06_009_eng.html
- http://www.securityfocus.com/archive/1/425141/100/0/threaded
- http://www.securityfocus.com/bid/16643
- http://www.vupen.com/english/advisories/2006/0578
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-009
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24492
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1595
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1650
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1664
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1688
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A727