// For flags

CVE-2011-0092

Microsoft Visio 2007 LZW Stream Decompression Exception Vulnerability

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The LZW stream decompression functionality in ORMELEMS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 allows remote attackers to execute arbitrary code via a Visio file with a malformed VisioDocument stream that triggers an exception handler that accesses an object that has not been fully initialized, which triggers memory corruption, aka "Visio Object Memory Corruption Vulnerability."

La funcionalidad de descompresión de transmisión LZW en la biblioteca ORMELEMS.DLL en Visio 2002 SP2, 2003 SP3 y 2007 SP2 de Microsoft, permite a los atacantes remotos ejecutar código arbitrario por medio de un archivo de Visio con una transmisión VisioDocument malformada que activa a un manejador de excepciones que tiene acceso a un objeto que no ha sido inicializado completamente, lo que desencadena una corrupción de memoria, también se conoce como "Visio Object Memory Corruption Vulnerability".

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the way Visio handles parsing the VisioDocument stream. Upon handling a malformed stream, the application will raise an exception. While handling this exception, the application will access the vtable of an object that hasn't been completely initialized yet. Successful exploitation could lead to code execution under the context of the application.

*Credits: Procyun
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-12-21 CVE Reserved
  • 2011-02-08 CVE Published
  • 2024-02-27 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Visio
Search vendor "Microsoft" for product "Visio"
2002
Search vendor "Microsoft" for product "Visio" and version "2002"
sp2
Affected
Microsoft
Search vendor "Microsoft"
Visio
Search vendor "Microsoft" for product "Visio"
2003
Search vendor "Microsoft" for product "Visio" and version "2003"
sp3
Affected
Microsoft
Search vendor "Microsoft"
Visio
Search vendor "Microsoft" for product "Visio"
2007
Search vendor "Microsoft" for product "Visio" and version "2007"
sp2
Affected