CVE-2011-0092
Microsoft Visio 2007 LZW Stream Decompression Exception Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The LZW stream decompression functionality in ORMELEMS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 allows remote attackers to execute arbitrary code via a Visio file with a malformed VisioDocument stream that triggers an exception handler that accesses an object that has not been fully initialized, which triggers memory corruption, aka "Visio Object Memory Corruption Vulnerability."
La funcionalidad de descompresión de transmisión LZW en la biblioteca ORMELEMS.DLL en Visio 2002 SP2, 2003 SP3 y 2007 SP2 de Microsoft, permite a los atacantes remotos ejecutar código arbitrario por medio de un archivo de Visio con una transmisión VisioDocument malformada que activa a un manejador de excepciones que tiene acceso a un objeto que no ha sido inicializado completamente, lo que desencadena una corrupción de memoria, también se conoce como "Visio Object Memory Corruption Vulnerability".
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the way Visio handles parsing the VisioDocument stream. Upon handling a malformed stream, the application will raise an exception. While handling this exception, the application will access the vtable of an object that hasn't been completely initialized yet. Successful exploitation could lead to code execution under the context of the application.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-12-21 CVE Reserved
- 2011-02-08 CVE Published
- 2024-02-27 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://osvdb.org/70828 | Vdb Entry | |
http://www.securityfocus.com/archive/1/516274/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/46137 | Vdb Entry | |
http://www.securitytracker.com/id?1025043 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-11-063 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64923 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12403 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/43254 | 2018-10-12 | |
http://www.vupen.com/english/advisories/2011/0321 | 2018-10-12 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-008 | 2018-10-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Visio Search vendor "Microsoft" for product "Visio" | 2002 Search vendor "Microsoft" for product "Visio" and version "2002" | sp2 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Visio Search vendor "Microsoft" for product "Visio" | 2003 Search vendor "Microsoft" for product "Visio" and version "2003" | sp3 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Visio Search vendor "Microsoft" for product "Visio" | 2007 Search vendor "Microsoft" for product "Visio" and version "2007" | sp2 |
Affected
|