MS KB2219475: Windows Help Center hcp:// Protocol Handler Arbitrary Code Execution

high Nessus Plugin ID 47045

Synopsis

It may be possible to execute arbitrary code on the remote host using Windows Help and Support Center.

Description

If a remote attacker can trick a user on the affected host into accessing a malicious web page containing specially crafted 'hcp://' URLs, an as-yet unpatched vulnerability in Windows Help and Support Center that arises due to its failure to validate URLs that use the HCP protocol could be leveraged to execute arbitrary code on the host subject to the user's privileges.

Solution

Either apply MS10-042 or consider unregistering the HCP protocol as a workaround.

Note, though, that applying the workaround will break local, legitimate help links that use 'hcp://'.

See Also

https://seclists.org/fulldisclosure/2010/Jun/205

https://www.nessus.org/u?1bd7b338

https://www.nessus.org/u?da3bd311

Plugin Details

Severity: High

ID: 47045

File Name: smb_kb_2219475.nasl

Version: 1.29

Type: local

Agent: windows

Family: Windows

Published: 6/18/2010

Updated: 8/5/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersion, SMB/Missing/MS10-042

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 6/9/2010

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Microsoft Help Center XSS and Command Execution)

Reference Information

CVE: CVE-2010-1885, CVE-2010-2265

BID: 40721, 40725

CERT: 578319

IAVA: 2010-A-0095-S

MSFT: MS10-042

MSKB: 2219475