Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.801358
Categoría:Windows : Microsoft Bulletins
Título:Microsoft Windows Help and Support Center RCE Vulnerability
Resumen:Microsoft Windows is prone to a remote code execution (RCE); vulnerability.;; This VT has been deprecated and replaced by the VT 'Microsoft Help and Support Center Remote Code Execution; Vulnerability (2229593)' (OID: 1.3.6.1.4.1.25623.1.0.902080)
Descripción:Summary:
Microsoft Windows is prone to a remote code execution (RCE)
vulnerability.

This VT has been deprecated and replaced by the VT 'Microsoft Help and Support Center Remote Code Execution
Vulnerability (2229593)' (OID: 1.3.6.1.4.1.25623.1.0.902080)

Vulnerability Insight:
The flaws are due to:

- An error in the 'MPC::HTML::UrlUnescapeW()' function within the Help and Support Center
application (helpctr.exe) that does not properly check the return code of 'MPC::HexToNum()' when
escaping URLs, which could allow attackers to bypass whitelist restrictions and invoke arbitrary
help files.

- An input validation error in the 'GetServerName()' function in the
'C:\WINDOWS\PCHealth\HelpCtr\System\sysinfo\commonFunc.js' script invoked via 'ShowServerName()'
in 'C:\WINDOWS\PCHealth\HelpCtr\System\sysinfo\sysinfomain.htm', which could be exploited by
attackers to execute arbitrary scripting code.

Vulnerability Impact:
Successful exploitation will allow remote attackers to execute
arbitrary code or compromise a vulnerable system.

Affected Software/OS:
- Microsoft Windows XP Service Pack 2/3

- Microsoft Windows Server 2003 Service Pack 2

Solution:
The vendor has released a patch for the issue. Please see the
references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-1885
BugTraq ID: 40725
http://www.securityfocus.com/bid/40725
Bugtraq: 20100609 Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly (Google Search)
http://www.securityfocus.com/archive/1/511774/100/0/threaded
Bugtraq: 20100610 Re: Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly (Google Search)
http://www.securityfocus.com/archive/1/511783/100/0/threaded
Cert/CC Advisory: TA10-194A
http://www.us-cert.gov/cas/techalerts/TA10-194A.html
CERT/CC vulnerability note: VU#578319
http://www.kb.cert.org/vuls/id/578319
http://www.exploit-db.com/exploits/13808
http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0197.html
http://blogs.technet.com/b/msrc/archive/2010/06/10/windows-help-vulnerability-disclosure.aspx
Microsoft Security Bulletin: MS10-042
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-042
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11733
http://www.securitytracker.com/id?1024084
http://secunia.com/advisories/40076
http://www.vupen.com/english/advisories/2010/1417
XForce ISS Database: ms-win-helpctr-command-execution(59267)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59267
Common Vulnerability Exposure (CVE) ID: CVE-2010-2265
BugTraq ID: 40721
http://www.securityfocus.com/bid/40721
http://blogs.technet.com/b/srd/archive/2010/06/10/help-and-support-center-vulnerability-full-disclosure-posting.aspx
http://www.microsoft.com/technet/security/advisory/2219475.mspx
CopyrightCopyright (C) 2010 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.