It is possible to invoke winhlp32.exe from Internet Explorer 8,7,6 using VBScript.
Passing malicious .HLP file to winhlp32 could allow remote attacker to run arbitrary command.
Additionally, there is a stack overflow vulnerability in winhlp32.exe.
To trigger vulnerability some user interaction is needed, victim has to press F1 when MsgBox popup is displayed.
AFFECTED software: Windows XP SP3
NOT affected: Vista, Windows 7
This has been along for quite some time, a similar issue 5 years ago: http://www.derkeiler.com/Mailing-Lists/Securiteam/2002-08/0037.html
Comes down to this - continuing use of an insecure format.
Issues are only dealt with by MS whenever it can no longer be ignored/obscured,
because nobody should open an untrusted .HLP file.
An HLP file is the most similar to an executable but not being one,
mainly due to its powerful scripting language.
One of the documented macros documented and supported by this format is
“RegisterRoutine”. Using this macro we can reference any Export of any Dll.