CVE-2010-1885

CRITICAL
2010-06-15 [email protected]
9.3
CVSS 2.0
Share

CVSS Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C
Attack Vector
Network
Attack Complexity
M
Confidentiality
C
Integrity
C
Availability
C

Lifecycle Timeline

3
Analysis Generated
Mar 26, 2026 - 11:17 vuln.today
PoC Detected
Apr 11, 2025 - 00:51 vuln.today
Public exploit code
CVE Published
Jun 15, 2010 - 14:04 nvd
CRITICAL 9.3

Description

The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, which allows remote attackers to bypass the trusted documents whitelist (fromHCP option) and execute arbitrary commands via a crafted hcp:// URL, aka "Help Center URL Validation Vulnerability."

Analysis

Microsoft Windows Help and Support Center in XP and Server 2003 contains a URL validation bypass in the HCP protocol handler. The MPC::HexToNum function mishandles escape sequences, allowing attackers to bypass the trusted documents whitelist and execute arbitrary commands via crafted hcp:// URLs.

Technical Context

The hcp:// protocol handler includes a fromHCP security check that restricts which help documents can be opened. The MPC::HexToNum function in helpctr.exe fails to properly handle malformed percent-encoded sequences, allowing attackers to craft URLs that bypass the whitelist check. Combined with the ability to invoke scripting within help documents, this enables arbitrary command execution.

Affected Products

['Microsoft Windows XP SP2/SP3', 'Microsoft Windows Server 2003 SP2', 'Microsoft Windows XP Professional x64']

Remediation

Upgrade from Windows XP/Server 2003 to a supported operating system. If legacy systems cannot be upgraded, unregister the HCP protocol handler via registry modification. Implement network-level controls to block hcp:// protocol traffic.

Priority Score

76
Low Medium High Critical
KEV: 0
EPSS: +92.2
CVSS: +46
POC: +20

Share

CVE-2010-1885 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy