[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2010-1885Date: (C)2010-06-15   (M)2023-12-22


The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, which allows remote attackers to bypass the trusted documents whitelist (fromHCP option) and execute arbitrary commands via a crafted hcp:// URL, aka "Help Center URL Validation Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.3
Exploit Score: 8.6
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1024084
EXPLOIT-DB-13808
http://www.securityfocus.com/archive/1/511774/100/0/threaded
http://www.securityfocus.com/archive/1/511783/100/0/threaded
SECUNIA-40076
BID-40725
ADV-2010-1417
MS10-042
TA10-194A
VU#578319
http://blogs.technet.com/b/msrc/archive/2010/06/10/windows-help-vulnerability-disclosure.aspx
http://blogs.technet.com/b/srd/archive/2010/06/10/help-and-support-center-vulnerability-full-disclosure-posting.aspx
http://www.microsoft.com/technet/security/advisory/2219475.mspx
ms-win-helpctr-command-execution(59267)
oval:org.mitre.oval:def:11733

CPE    6
cpe:/o:microsoft:windows_2003_server::sp2:itanium
cpe:/o:microsoft:windows_2003_server::sp2
cpe:/o:microsoft:windows_xp:-:sp2:x64
cpe:/o:microsoft:windows_xp::sp3
...
CWE    1
CWE-78
OVAL    2
oval:org.secpod.oval:def:1372
oval:org.mitre.oval:def:11733

© SecPod Technologies