WindowsIn XP0 dayThe vulnerability is a zero-day vulnerability in the Windows Help Center program. It is caused by an error in calling the hcp protocol when the Help Center program performs format processing. Attackers can exploit this vulnerability to execute any existing program, such as a Trojan, on a user's computer. Or control the user's browser to access some other URLs.
However, the majority of users do not have to worry too much about this 0-day vulnerability. This vulnerability only affects Windows Xp and Windows 2003. Currently, malicious code only has direct and effective attack effects on IE 6 browsers. If you are using IE8, a prompt box that requires manual confirmation will inevitably pop up on the screen. malicious scripts cannot run unless you allow it to run. This is exactly its "fox tail ".
Users using Windows 2000, Windows Vista, Windows 7, Windows Server 2008, and other operating systems will not be affected by this vulnerability.
You can manually enter the command line to completely eliminate the impact of the vulnerability. The manual solution is as follows:
Open the cmd command prompt and execute two commands. The first is
Reg export HKEY_CLASSES_ROOTHCP hcp_backup.reg
This step is used to back up the HCP protocol. Run the second command.
Reg delete HKEY_CLASSES_ROOTHCP/f
Disable the existing hcp protocol so that the vulnerability is not affected. After Microsoft releases a patch, if you want to, double-click the hcp_backup.reg backup to restore the hcp protocol.
The fix for the 0-day vulnerability in Windows XP is over now.