Anfälligkeitssuche        Suche in 187964 CVE Beschreibungen
und 85075 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.801358
Kategorie:Windows
Titel:MS Windows Help and Support Center Remote Code Execution Vulnerability
Zusammenfassung:This host is prone to remote code execution vulnerability.;; This VT has been replaced by 'Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)' (OID: 1.3.6.1.4.1.25623.1.0.902080)
Beschreibung:Summary:
This host is prone to remote code execution vulnerability.

This VT has been replaced by 'Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)' (OID: 1.3.6.1.4.1.25623.1.0.902080)

Vulnerability Insight:
The flaws are due to:

- An error in the 'MPC::HTML::UrlUnescapeW()' function within the Help and
Support Center application (helpctr.exe) that does not properly check the
return code of 'MPC::HexToNum()' when escaping URLs, which could allow
attackers to bypass whitelist restrictions and invoke arbitrary help files.

- An input validation error in the 'GetServerName()' function in the
'C:\WINDOWS\PCHealth\HelpCtr\System\sysinfo\commonFunc.js' script invoked via
'ShowServerName()' in 'C:\WINDOWS\PCHealth\HelpCtr\System\sysinfo\sysinfomain.htm',
which could be exploited by attackers to execute arbitrary scripting code.

Vulnerability Impact:
Successful exploitation will allow remote attackers to execute
arbitrary code or compromise a vulnerable system.

Affected Software/OS:
- Microsoft Windows XP Service Pack 2/3

- Microsoft Windows Server 2003 Service Pack 2

Solution:
Vendor has released a patch for the issue. Please see the references
for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-1885
BugTraq ID: 40725
http://www.securityfocus.com/bid/40725
Bugtraq: 20100609 Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly (Google Search)
http://www.securityfocus.com/archive/1/511774/100/0/threaded
Bugtraq: 20100610 Re: Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly (Google Search)
http://www.securityfocus.com/archive/1/511783/100/0/threaded
Cert/CC Advisory: TA10-194A
http://www.us-cert.gov/cas/techalerts/TA10-194A.html
CERT/CC vulnerability note: VU#578319
http://www.kb.cert.org/vuls/id/578319
http://www.exploit-db.com/exploits/13808
http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0197.html
http://blogs.technet.com/b/msrc/archive/2010/06/10/windows-help-vulnerability-disclosure.aspx
Microsoft Security Bulletin: MS10-042
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-042
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11733
http://www.securitytracker.com/id?1024084
http://secunia.com/advisories/40076
http://www.vupen.com/english/advisories/2010/1417
XForce ISS Database: ms-win-helpctr-command-execution(59267)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59267
Common Vulnerability Exposure (CVE) ID: CVE-2010-2265
BugTraq ID: 40721
http://www.securityfocus.com/bid/40721
http://blogs.technet.com/b/srd/archive/2010/06/10/help-and-support-center-vulnerability-full-disclosure-posting.aspx
http://www.microsoft.com/technet/security/advisory/2219475.mspx
CopyrightCopyright (C) 2010 Greenbone Networks GmbH

Dies ist nur einer von 85075 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.