Overview
The Microsoft Windows Help and Support Center application fails to properly sanitize hcp:// URIs, which can allow a remote, unauthenticated attacker to execute arbitrary commands.
Description
Microsoft Windows Help and Support Center is the default handler for the hcp protocol on Windows XP and 2003 systems. When an hcp:// URI is encountered, Windows will launch the Help and Support Center application, which is provided by helpctr.exe. When helpctr.exe is invoked from an hcp:// URI, it operates in a more restricted mode by using the -FromHCP command-line parameter. This is supposed to restrict the Help and Support Center to a whitelisted set of help documents and parameters. The UrlUnescape function that is used by helpctr.exe contains an error that allows an attacker to bypass the whitelist restrictions provided by the -FromHCP option. By leveraging an XSS vulnerability in an existing Help and Support Center document, an attacker can inject arbitrary script commands into a Help and Support Center session. Because the Help and Support Center documents are located in a trusted zone, this can allow arbitrary Windows commands to be executed. |
Impact
By causing Microsoft Windows to handle a specially crafted hcp:// URI, a remote, unauthenticated attacker can execute arbitrary commands with the privileges of the user. This can happen as the result of viewing a specially crafted webpage, opening a Windows Media Player file, or through the use of other attack vectors. |
Solution
Apply an update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.microsoft.com/technet/security/Bulletin/MS10-042.mspx
- http://seclists.org/fulldisclosure/2010/Jun/205
- http://www.microsoft.com/technet/security/advisory/2219475.mspx
- http://blogs.technet.com/b/msrc/archive/2010/06/10/windows-help-vulnerability-disclosure.aspx
- http://blogs.technet.com/b/srd/archive/2010/06/10/help-and-support-center-vulnerability-full-disclosure-posting.aspx
- http://technet.microsoft.com/en-us/library/bb490918.aspx
- http://msdn.microsoft.com/en-us/library/bb773791%28VS.85%29.aspx
- http://secunia.com/advisories/40076
- http://www.theregister.co.uk/2010/06/10/windows_help_bug/
Acknowledgements
This vulnerability was discovered and publicly reported by Tavis Ormandy.
This document was written by Will Dormann.
Other Information
CVE IDs: | None |
Severity Metric: | 43.38 |
Date Public: | 2010-06-09 |
Date First Published: | 2010-06-10 |
Date Last Updated: | 2010-07-13 18:40 UTC |
Document Revision: | 33 |