{"vuid":"VU#484814","idnumber":"484814","name":"Microsoft Help and Support Center (HCP) fails to properly validate HCP URLs","keywords":["Cross-Domain","Microsoft","Help and Support Center","HCP","remote code execution","MS04-015","840374"],"overview":"The Microsoft Help and Support Center (HCP) fails to properly handle HCP URL validation. Exploitation of this vulnerability may permit remote attackers to execute arbitrary code on the system with the privileges of the current user.","clean_desc":"Microsoft Windows XP and Server 2003 Help and Support Center (HCP) fails to properly handle HCP URL validation. This vulnerability can be exploited remotely through the use of a crafted URL via the HCP protocol handler (hcp://). In order to exploit this vulnerability a remote attacker would have to trick the victim into clicking on a malicious link, or visiting a malicious site. The victim may be required to take additional steps in order for exploitation to be successful. Microsoft has released Security Bulletin MS04-015 to address this issue. According to Microsoft's Security Bulletin MS04-015, the following systems are affected: Microsoft Windows XP and Microsoft Windows XP Service Pack 1\nMicrosoft Windows XP 64-Bit Edition Service Pack 1\nMicrosoft Windows XP 64-Bit Edition Version 2003\nMicrosoft Windows Server 2003\nMicrosoft Windows Server 2003 64-Bit Edition \nThe following systems are not affected: Microsoft Windows NT® Workstation 4.0 Service Pack 6a\nMicrosoft Windows NT Server 4.0 Service Pack 6a\nMicrosoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6\nMicrosoft Windows 2000 Service Pack 2, Microsoft Windows 2000 Service Pack 3, Microsoft Windows 2000 Service Pack 4\nMicrosoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)","impact":"If a remote attacker could trick a victim into viewing a malicious web page or email message, the attacker could crash the system or potentially execute arbitrary code on the system with the privileges of the current user.","resolution":"Apply the patch or workarounds provided in Microsoft's Security Bulletin MS04-015 to address this issue. Note that applying the patch or workarounds may affect the functionality of your system. Please read the impacts outlined in Microsoft's advisory carefully and determine the impact to your configuration. http://support.microsoft.com/default.aspx?scid=841996","workarounds":"","sysaffected":"","thanks":"Thanks to Donnie Werner of exploitlabs.com for reporting this vulnerability.","author":"This document was written by Jason A Rafail and is based on information provided in Microsoft's Security Bulletin MS04-015.","public":["http://www.microsoft.com/technet/security/bulletin/MS04-015.mspx","http://exploitlabs.com/files/advisories/EXPL-A-2003-027-helpctr.txt"],"cveids":["CVE-2004-0199"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-05-11T17:28:01Z","publicdate":"2004-05-11T00:00:00Z","datefirstpublished":"2004-05-11T18:22:59Z","dateupdated":"2004-08-02T13:45:34Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"12.65625","cam_scorecurrentwidelyknown":"15.8203125","cam_scorecurrentwidelyknownexploited":"28.4765625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":12.65625,"vulnote":null}