Vulnerability Note VU#851777

Microsoft Office 2010 Visio iFilter memory corruption vulnerability

Original Release date: 01 Oct 2013 | Last revised: 01 Oct 2013

Overview

The Microsoft Office 2010 Visio iFilter contains a memory corruption vulnerability that can allow a remote attacker to execute arbitrary code on a vulnerable system.

Description

Microsoft Office 2010 provides a set of iFilters that are used by a variety of applications to process Office documents. The Office 2010 Filter Pack is a stand-alone package that provides the iFilters. A variety of applications may use iFilters, including Microsoft Windows Search, Microsoft Internet Information Server (IIS), SharePoint Portal Server, Exchange Server, and SQL Server. The Visio ifilter, which is provided by VISFILT.DLL, contains a memory corruption vulnerability.

Impact

By causing a specially-crafted Visio document to be processed with the Visio iFilter, a remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the process using the iFilter. This can happen through a number of attack vectors, including placing a Visio file in a location that is indexed by Windows Search.

Solution

Apply an update

This issue is addressed by the update for Microsoft Security Bulletin MS13-023.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected08 Aug 201201 Oct 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 10.0 AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal 7.8 E:POC/RL:OF/RC:C
Environmental 5.9 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

This vulnerability was reported by Will Dormann of the CERT/CC

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2013-0079
  • US-CERT Alert: TA13-071A
  • Date Public: 12 Mar 2013
  • Date First Published: 01 Oct 2013
  • Date Last Updated: 01 Oct 2013
  • Document Revision: 12

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.