The vulnerability was reported to Microsoft on July, 5th by Google security researcher Tavis Ormandy.
The vulnerability was used to compromise Federal Financial Institutions Examination Council via тАЬinform@ffiec.govтАЭ mailbox.
Advisory: SB2010061002 - Remote code execution when parsing URLs in Microsoft Windows
Vulnerable component: Windows
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C
CWE-ID: CWE-20 - Improper input validation
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to an error when parsing URLs within Microsoft Help and Support Center. A remote attacker can create a specially crafted hcp:// URL, trick the victim into clicking on it and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
Note: this vulnerability is being actively exploited.
- Microsoft Windows Help Centre Handles - Malformed Escape Sequences Incorrectly (MS03-044) [Exploit-DB]
- Microsoft Help Center - Cross-Site Scripting / Command Execution (MS10-042) (Metasploit) [Exploit-DB]