Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-1972 | First vendor Publication | 2011-08-10 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Visio 2003 SP3, 2007 SP2, and 2010 Gold and SP1 does not properly validate objects in memory during Visio file parsing, which allows remote attackers to execute arbitrary code via a crafted file, aka "pStream Release RCE Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1972 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12852 | |||
Oval ID: | oval:org.mitre.oval:def:12852 | ||
Title: | pStream Release RCE Vulnerability | ||
Description: | Microsoft Visio 2003 SP3, 2007 SP2, and 2010 Gold and SP1 does not properly validate objects in memory during Visio file parsing, which allows remote attackers to execute arbitrary code via a crafted file, aka "pStream Release RCE Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-1972 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Office Visio 2003 Microsoft Office Visio 2007 Microsoft Office Visio 2010 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 6 |
OpenVAS Exploits
Date | Description |
---|---|
2011-08-11 | Name : Microsoft Visio Remote Code Execution Vulnerabilities (2560978) File : nvt/secpod_ms11-060.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
74397 | Microsoft Visio pStream Release Visio File Handling Remote Code Execution Microsoft Visio contains a flaw related to the parsing of certain objects in memory when handling Visio files that may allow a context-dependent attacker to execute arbitrary code. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2011-08-11 | IAVM : 2011-B-0097 - Multiple Vulnerabilities in Microsoft Office Visio Severity : Category II - VMSKEY : V0029776 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-07-28 | Microsoft Office Visio UML string object heap buffer overflow attempt RuleID : 34975 - Revision : 3 - Type : FILE-OFFICE |
2015-07-28 | Microsoft Office Visio UML string object heap buffer overflow attempt RuleID : 34974 - Revision : 3 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Visio invalid UMLDTOptions object exploit attempt RuleID : 19676 - Revision : 12 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Visio invalid UMLString data length exploit attempt RuleID : 19675 - Revision : 15 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-08-09 | Name : Arbitrary code can be executed on the remote Windows host through Visio. File : smb_nt_ms11-060.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:04:29 |
|
2024-11-28 12:25:45 |
|
2021-05-04 12:14:30 |
|
2021-04-22 01:15:48 |
|
2020-05-23 00:28:33 |
|
2018-10-13 05:18:32 |
|
2017-09-19 09:24:27 |
|
2016-04-26 20:46:13 |
|
2014-02-17 11:02:30 |
|
2014-01-19 21:27:50 |
|
2013-11-11 12:39:24 |
|
2013-05-10 23:00:54 |
|