{"vuid":"VU#739844","idnumber":"739844","name":"Microsoft Windows Korean Input Method Editor vulnerability","keywords":["Microsoft","Windows","Korean Input Method Editor","IME","privilege escalation","Office","MS06-009"],"overview":"The Microsoft Windows Korean Input Method Editor (IME) contains a privilege escalation vulnerability.","clean_desc":"According to Microsoft: An IME is a program that allows computer users to enter complex characters and symbols, such as Japanese characters, using a standard keyboard. The Microsoft Windows Korean IME contains a vulnerability that may allow an attacker to gain SYSTEM privileges. To exploit this vulnerability, the Korean IME must be installed and the attacker must have access to the Windows login screen. For more information, including a list of vulnerable systems, please refer to Microsoft Security Bulletin MS06-009.","impact":"An attacker may be able to gain SYSTEM privileges on a vulnerable system.","resolution":"Apply an Update\nMicrosoft has addressed this issue in Microsoft Security Bulletin MS06-009.","workarounds":"Please see Microsoft Security Bulletin MS06-009 for a list of workarounds to mitigate this vulnerability.","sysaffected":"","thanks":"This vulnerability was reported in Microsoft Security Bulletin \nMS06-009\n. Microsoft credits Ryan Lee of VMCraft Inc. with providing information regarding this issue.","author":"This document was written by Jeff Gennari.","public":["http://www.microsoft.com/technet/security/bulletin/ms06-009.mspx","http://www.microsoft.com/windows/ie/downloads/recommended/ime/default.mspx"],"cveids":["CVE-2006-0008"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-02-14T18:45:20Z","publicdate":"2006-02-14T00:00:00Z","datefirstpublished":"2006-02-14T21:17:45Z","dateupdated":"2006-02-22T14:17:14Z","revision":14,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"2","cam_population":"20","cam_impact":"20","cam_easeofexploitation":"5","cam_attackeraccessrequired":"10","cam_scorecurrent":"6.375","cam_scorecurrentwidelyknown":"8.25","cam_scorecurrentwidelyknownexploited":"15.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":6.375,"vulnote":null}