Follow:

 

Exploit:Win32/CVE-2010-1885.gen


Exploit:Win32/CVE-2010-1885.gen is a generic detection for a cross-site scripting method that exploits a vulnerability (CVE-2010-1885) in Windows Help and Support Center that could allow an attacker to run arbitrary code on the local computer.


What to do now

Microsoft Security Advisory (2219475) provides additional guidance.
 
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as Microsoft Security Essentials, or the Microsoft Safety Scanner. For more information about using antivirus software, see http://www.microsoft.com/security/antivirus/av.aspx.

Threat behavior

Exploit:Win32/CVE-2010-1885.gen is a generic detection for a cross-site scripting method that exploits a vulnerability (CVE-2010-1885) in Windows Help and Support Center that could allow an attacker to run arbitrary code on the local computer.
Installation
Exploit:Win32/CVE-2010-1885.gen may be encountered if a Windows XP/2003 user is enticed to browse a malicious Web page or click on a hyperlink that contains the exploit.
 
The exploit passes a URL (for example, hcp://<URL>) to "helpctr.exe" using specific escape sequences that could result in the execution of arbitrary code.
 
This exploit affects computers running Windows XP/2003 with Internet Explorer 8 (or below) and Windows Media Player 9. Upgrading to Windows Media Player 10 prevents the exploit from running without a prompt.
Additional Information
For more information about this vulnerability, see the resources below:
 
Analysis by Andrei Florin Saygo

Symptoms

Alert notifications or detections of this malware from installed antivirus or security software may be the only other symptom(s).

Prevention


Alert level: Severe
First detected by definition: 1.83.1561.0
Latest detected by definition: 1.161.1207.0 and higher
First detected on: Jun 11, 2010
This entry was first published on: Jun 28, 2010
This entry was updated on: Apr 17, 2011

This threat is also detected as:
  • Exploit.HTML.CVE-2010-1885.a (Kaspersky)
  • Exploit/Cve-2010-1885 (Norman)
  • Exploit.CVE-2010-1885.C (BitDefender)
  • HTML/Exploit.CVE-2010-1885 (ESET)
  • Exploit.Win32.CVE-2010-1885 (Ikarus)
  • Exploit-CVE2010-1885 (McAfee)
  • Mal/HcpExpl-A (Sophos)
  • TROJ_HCPEXP.A (Trend Micro)
  • Exploit.HTML.HCP.a (Sunbelt Software)