[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-0092Date: (C)2011-02-10   (M)2023-12-22


The LZW stream decompression functionality in ORMELEMS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 allows remote attackers to execute arbitrary code via a Visio file with a malformed VisioDocument stream that triggers an exception handler that accesses an object that has not been fully initialized, which triggers memory corruption, aka "Visio Object Memory Corruption Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.3
Exploit Score: 8.6
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1025043
http://www.securityfocus.com/archive/1/516274/100/0/threaded
SECUNIA-43254
BID-46137
OSVDB-70828
ADV-2011-0321
MS11-008
http://www.zerodayinitiative.com/advisories/ZDI-11-063/
ms-visio-object-code-execution(64923)
oval:org.mitre.oval:def:12403

CPE    3
cpe:/a:microsoft:visio:2007:sp2
cpe:/a:microsoft:visio:2003:sp3
cpe:/a:microsoft:visio:2002:sp2
CWE    1
CWE-94
OVAL    2
oval:org.secpod.oval:def:1033
oval:org.secpod.oval:def:86

© SecPod Technologies