mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
137 lines
5.3 KiB
JSON
137 lines
5.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secure@microsoft.com",
|
|
"ID": "CVE-2010-1885",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, which allows remote attackers to bypass the trusted documents whitelist (fromHCP option) and execute arbitrary commands via a crafted hcp:// URL, aka \"Help Center URL Validation Vulnerability.\""
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "VU#578319",
|
|
"refsource": "CERT-VN",
|
|
"url": "http://www.kb.cert.org/vuls/id/578319"
|
|
},
|
|
{
|
|
"name": "20100609 Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/511774/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "ms-win-helpctr-command-execution(59267)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59267"
|
|
},
|
|
{
|
|
"name": "20100610 Re: Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/511783/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "http://blogs.technet.com/b/srd/archive/2010/06/10/help-and-support-center-vulnerability-full-disclosure-posting.aspx",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://blogs.technet.com/b/srd/archive/2010/06/10/help-and-support-center-vulnerability-full-disclosure-posting.aspx"
|
|
},
|
|
{
|
|
"name": "40725",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/40725"
|
|
},
|
|
{
|
|
"name": "20100609 Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly",
|
|
"refsource": "FULLDISC",
|
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0197.html"
|
|
},
|
|
{
|
|
"name": "1024084",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id?1024084"
|
|
},
|
|
{
|
|
"name": "13808",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "http://www.exploit-db.com/exploits/13808"
|
|
},
|
|
{
|
|
"name": "http://blogs.technet.com/b/msrc/archive/2010/06/10/windows-help-vulnerability-disclosure.aspx",
|
|
"refsource": "MISC",
|
|
"url": "http://blogs.technet.com/b/msrc/archive/2010/06/10/windows-help-vulnerability-disclosure.aspx"
|
|
},
|
|
{
|
|
"name": "http://www.microsoft.com/technet/security/advisory/2219475.mspx",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.microsoft.com/technet/security/advisory/2219475.mspx"
|
|
},
|
|
{
|
|
"name": "TA10-194A",
|
|
"refsource": "CERT",
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA10-194A.html"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:11733",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11733"
|
|
},
|
|
{
|
|
"name": "ADV-2010-1417",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2010/1417"
|
|
},
|
|
{
|
|
"name": "MS10-042",
|
|
"refsource": "MS",
|
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-042"
|
|
},
|
|
{
|
|
"name": "40076",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/40076"
|
|
}
|
|
]
|
|
}
|
|
} |