Short Name |
HTTP:STC:HSC:MS-HSC-URL-VLN |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
HSC DVDUpgrade Input Validation |
Release Date |
2004/05/11 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects URLs containing invalid HTTP links to the Microsoft Help Center. Attackers can exploit an input validation by sending a specially formatted HSC URL on a Web page. Windows XP prior to service pack 2, and the Windows 2003 Server are vulnerability. A successful exploit can allow the attacker to execute arbitrary code on the affected system.
A security vulnerability has been reported in Microsoft Windows XP and Server 2003 operating systems. This issue exists in the Help and Support Center (HSC) and is due to how the feature handles HCP invocation URIs for DVD driver upgrades. This issue could be exploited from a malicious web page or HTML e-mail to cause a malicious executable to be run on a vulnerable system. This would occur in the context of the victim user, though it has been reported that significant user interaction is required for exploitation to occur. While this issue may be exploited through Internet Explorer, it should also be noted that third-party web client software could also invoke HSC via a HCP URI.