MS KB2219475: Windows Help Center hcp:// Protocol Handler Arbitrary Code Execution

High Nessus Plugin ID 47045


It may be possible to execute arbitrary code on the remote host using Windows Help and Support Center.


If a remote attacker can trick a user on the affected host into accessing a malicious web page containing specially crafted 'hcp://' URLs, an as-yet unpatched vulnerability in Windows Help and Support Center that arises due to its failure to validate URLs that use the HCP protocol could be leveraged to execute arbitrary code on the host subject to the user's privileges.


Either apply MS10-042 or consider unregistering the HCP protocol as a workaround.

Note, though, that applying the workaround will break local, legitimate help links that use 'hcp://'.

See Also

Plugin Details

Severity: High

ID: 47045

File Name: smb_kb_2219475.nasl

Version: $Revision: 1.26 $

Type: local

Agent: windows

Family: Windows

Published: 2010/06/18

Modified: 2017/08/30

Dependencies: 13855, 47710

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersion, SMB/Missing/MS10-042

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2010/06/09

Exploitable With


Core Impact

Metasploit (Microsoft Help Center XSS and Command Execution)

Reference Information

CVE: CVE-2010-1885, CVE-2010-2265

BID: 40721, 40725

OSVDB: 65264, 65529

CERT: 578319

IAVA: 2010-A-0095

MSFT: MS10-042

MSKB: 2219475