MS Windows Help and Support Center Remote Code Execution Vulnerability

Summary
This host is prone to remote code execution vulnerability.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code or compromise a vulnerable system. Impact Level: System
Solution
Vendor has released a patch for the issue, refer below link for patch. http://www.microsoft.com/technet/security/bulletin/ms10-042.mspx
Insight
The flaws are due to: - An error in the 'MPC::HTML::UrlUnescapeW()' function within the Help and Support Center application (helpctr.exe) that does not properly check the return code of 'MPC::HexToNum()' when escaping URLs, which could allow attackers to bypass whitelist restrictions and invoke arbitrary help files. - An input validation error in the 'GetServerName()' function in the 'C:\WINDOWS\PCHealth\HelpCtr\System\sysinfo\commonFunc.js' script invoked via 'ShowServerName()' in 'C:\WINDOWS\PCHealth\HelpCtr\System\sysinfo\sysinfomain.htm', which could be exploited by attackers to execute arbitrary scripting code.
Affected
Windows XP Service Pack 2/3 Windows Server 2003 Service Pack 2.
References