8 February, 2011
- This vulnerability affects: Visio 2002, 2003, and 2007 (not 2010)
- How an attacker exploits it: By enticing one of your users into opening a maliciously crafted Visio document
- Impact: An attacker can execute code, potentially gaining complete control of your users’ computers
- What to do: Deploy the appropriate Visio patch as soon as possible, or let Windows Update do it for you
Microsoft Visio is a very popular diagramming application, which many administrators use to create network diagrams.
In a security bulletin released today, Microsoft describes two security vulnerabilities that affect all current versions of Visio (but not the standalone viewer application). Though technically different, both vulnerabilities share the same scope and impact: By enticing one of your users into downloading and opening a maliciously crafted Visio document, an attacker can exploit any of these vulnerabilities to execute code on a victim’s computer, usually inheriting that user’s level of privileges and permissions. If your user has local administrative privileges, the attacker gains full control of the user’s machine.
Microsoft has released patches to fix these vulnerabilities. You should download, test, and deploy the appropriate Visio patch as soon as possible, or let Windows Update do it for you.
For All WatchGuard Users:
If the practice fits your business environment, you can use the HTTP, SMTP, and/or POP3 proxies to block Visio documents with the .VSD extension. However, using this method blocks all such files, both malicious and legitimate. If you would like to use our proxies to block Visio documents, follow the links below for instructions:
- Firebox X Edge running 10.x
- Firebox X Core and X Peak running Fireware 10.x
Microsoft has released patches to fix these vulnerabilities.
This alert was researched and written by Corey Nachreiner, CISSP.
What did you think of this alert? Let us know at [email protected].
More alerts and articles: Log into the LiveSecurity Archive.