MS KB2219475: Windows Help Center hcp:// Protocol Handler Arbitrary Code Execution

high Nessus Plugin ID 47045


It may be possible to execute arbitrary code on the remote host using Windows Help and Support Center.


If a remote attacker can trick a user on the affected host into accessing a malicious web page containing specially crafted 'hcp://' URLs, an as-yet unpatched vulnerability in Windows Help and Support Center that arises due to its failure to validate URLs that use the HCP protocol could be leveraged to execute arbitrary code on the host subject to the user's privileges.


Either apply MS10-042 or consider unregistering the HCP protocol as a workaround.

Note, though, that applying the workaround will break local, legitimate help links that use 'hcp://'.

See Also

Plugin Details

Severity: High

ID: 47045

File Name: smb_kb_2219475.nasl

Version: 1.29

Type: local

Agent: windows

Family: Windows

Published: 6/18/2010

Updated: 8/5/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Critical

Score: 9.7


Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersion, SMB/Missing/MS10-042

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 6/9/2010

Exploitable With


Core Impact

Metasploit (Microsoft Help Center XSS and Command Execution)

Reference Information

CVE: CVE-2010-1885, CVE-2010-2265

BID: 40721, 40725

CERT: 578319

IAVA: 2010-A-0095-S

MSFT: MS10-042

MSKB: 2219475