Summary
This host is prone to remote code execution vulnerability.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code or compromise a vulnerable system.
Impact Level: System
Solution
Vendor has released a patch for the issue, refer below link for patch. http://www.microsoft.com/technet/security/bulletin/ms10-042.mspx
Insight
The flaws are due to:
- An error in the 'MPC::HTML::UrlUnescapeW()' function within the Help and Support Center application (helpctr.exe) that does not properly check the return code of 'MPC::HexToNum()' when escaping URLs, which could allow attackers to bypass whitelist restrictions and invoke arbitrary help files.
- An input validation error in the 'GetServerName()' function in the 'C:\WINDOWS\PCHealth\HelpCtr\System\sysinfo\commonFunc.js' script invoked via 'ShowServerName()' in 'C:\WINDOWS\PCHealth\HelpCtr\System\sysinfo\sysinfomain.htm', which could be exploited by attackers to execute arbitrary scripting code.
Affected
Windows XP Service Pack 2/3 Windows Server 2003 Service Pack 2.
References
Severity
Classification
-
CVE CVE-2010-1885, CVE-2010-2265 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities