Executive Summary

Summary
Title Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2451879)
Informations
Name MS11-008 First vendor Publication 2011-02-08
Vendor Microsoft Last vendor Modification 2011-02-08
Severity (Vendor) Important Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.0 (February 8, 2011): Bulletin published.Summary: This security update resolves two privately reported vulnerabilities in Microsoft Visio. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited either of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Original Source

Url : http://www.microsoft.com/technet/security/bulletin/MS11-008.mspx

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12403
 
Oval ID: oval:org.mitre.oval:def:12403
Title: Visio Attribute Validation Memory Corruption Vulnerability
Description: The LZW stream decompression functionality in ORMELEMS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 allows remote attackers to execute arbitrary code via a Visio file with a malformed VisioDocument stream that triggers an exception handler that accesses an object that has not been fully initialized, which triggers memory corruption, aka "Visio Object Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-0092
Version: 7
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Product(s): Microsoft Office Visio 2002
Microsoft Office Visio 2003
Microsoft Office Visio 2007
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12469
 
Oval ID: oval:org.mitre.oval:def:12469
Title: Visio Data Type Memory Corruption Vulnerability
Description: ELEMENTS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 does not properly parse structures during the opening of a Visio file, which allows remote attackers to execute arbitrary code via a file containing a malformed structure, aka "Visio Data Type Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-0093
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Product(s): Microsoft Office Visio 2002
Microsoft Office Visio 2003
Microsoft Office Visio 2007
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3

OpenVAS Exploits

Date Description
2011-02-09 Name : Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
File : nvt/secpod_ms11-008.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
70829 Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code ...

A memory corruption flaw exists in Microsoft Visio. The product fails to sanitize user-supplied input when handling crafted Visio files, resulting in memory corruption. With a specially crafted Visio file, a context-dependent attacker can execute arbitrary code.
70828 Microsoft Visio LZW Stream Decompression Exception Remote Code Execution

Microsoft Visio contains a flaw related to the parsing of VisioDocoument streams. The program raises an exception when handling a malformed stream, and attempts to access the vtable of an unitialized object. This may allow a context-dependent attacker to use a crafted Visio file to execute arbitrary code.

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Office Visio Data Type Memory Corruption
RuleID : 18755 - Revision : 16 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Visio ORMinfo classes length overflow attempt
RuleID : 18417 - Revision : 16 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Visio ORMinfo classes length overflow attempt
RuleID : 18416 - Revision : 16 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Visio deserialization double free attempt
RuleID : 18415 - Revision : 13 - Type : FILE-OFFICE

Nessus® Vulnerability Scanner

Date Description
2011-02-08 Name : Arbitrary code can be executed on the remote Windows host through Visio.
File : smb_nt_ms11-008.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:46:51
  • Multiple Updates
2014-01-19 21:30:36
  • Multiple Updates