Secunia Advisory SA40076

Microsoft Windows Help and Support Center URL Processing Vulnerability
Secunia Advisory SA40076
Release Date 2010-06-10
Last Update 2010-07-13
   
Popularity 6,864 views
Comments 0 comments

Criticality level Highly criticalHighly critical
Impact System access
Where From remote
Authentication level Available in Customer Area
   
Report reliability Available in Customer Area
Solution Status Vendor Patch
   
   
3rd party PoC/exploit Link available in Customer Area
Systems affected Available in Customer Area
Approve distribution Available in Customer Area
Remediation status Secunia CSI, Secunia PSI
Automated scanning Secunia CSI, Secunia PSI
   
Operating System
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows Storage Server 2003
Microsoft Windows XP Home Edition
Microsoft Windows XP Professional

Secunia CVSS Score Available in Customer Area
CVE Reference(s) CVE-2010-1885 CVSS available in Customer Area
CVE-2010-2265 CVSS available in Customer Area
  

Description
Tavis Ormandy has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an error when processing escaped URLs through Microsoft Windows Help and Support Center (helpctr.exe). This can be exploited to bypass restrictions normally imposed by the "-FromHCP" command-line argument and pass arbitrary parameters to local help documents.

Successful exploitation allows execution of arbitrary commands through the use of an additional input sanitation error in the sysinfomain.htm help document when opening a specially crafted "hcp://" URL.

The vulnerability is confirmed in Windows XP SP3 with Windows Media Player 9 and Internet Explorer 8. Windows Server 2003 is also reportedly affected.

Solution
Apply patches.
Further details available in Customer Area

Provided and/or discovered by
Tavis Ormandy

Changelog
Further details available in Customer Area

Original Advisory
MS10-042 (KB2229593):
http://www.microsoft.com/technet/security/bulletin/ms10-042.mspx

Tavis Ormandy:
http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0197.html

Other references
Further details available in Customer Area

Alternate/detailed remediation
Further details available in Customer Area

Deep Links
Links available in Customer Area


Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com
Subject: Microsoft Windows Help and Support Center URL Processing Vulnerability
 
No posts yet

-

You must be logged in to post a comment.



footer
© 2002-2010 Secunia ApS • Weidekampsgade 14A, DK-2300 Copenhagen S, Denmark • +45 7020 5144 • Contact Us
Terms & Conditions and CopyrightReport vulnerability
CVE logo OTA logo First logo