CVE-2010-1885
Microsoft Help Center - Cross-Site Scripting / Command Execution (MS10-042)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, which allows remote attackers to bypass the trusted documents whitelist (fromHCP option) and execute arbitrary commands via a crafted hcp:// URL, aka "Help Center URL Validation Vulnerability."
La función MPC::HexToNum en el fichero Helpctr.exe de la Ayuda de Microsoft Windows y soporte técnico en Windows XP y Windows Server 2003 no controla correctamente las secuencias de escape con formato incorrecto, lo que permite a atacantes remotos eludir la lista blanca de documentos de confianza (La opción fromHCP) y ejecutar comandos de su elección a través de una URL hcp:// debidamente modificada.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-05-11 CVE Reserved
- 2010-06-10 First Exploit
- 2010-06-14 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-31 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://blogs.technet.com/b/msrc/archive/2010/06/10/windows-help-vulnerability-disclosure.aspx | X_refsource_misc | |
http://www.kb.cert.org/vuls/id/578319 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/511774/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/511783/100/0/threaded | Mailing List | |
http://www.securitytracker.com/id?1024084 | Vdb Entry | |
http://www.us-cert.gov/cas/techalerts/TA10-194A.html | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/59267 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11733 | Signature |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/16545 | 2010-09-20 | |
https://www.exploit-db.com/exploits/13808 | 2010-06-10 | |
http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0197.html | 2024-08-07 | |
http://www.exploit-db.com/exploits/13808 | 2024-08-07 | |
http://www.securityfocus.com/bid/40725 | 2024-08-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | * | sp2 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | * | sp2, itanium |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2003 Search vendor "Microsoft" for product "Windows Server 2003" | * | sp2 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp2 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp3 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | - | sp2, x64 |
Affected
|