Site icon Secplicity – Security Simplified

Two Visio Document Parsing Vulnerabilities

Severity: Medium

10 August, 2011

Summary:

Exposure:

Microsoft Visio is a very popular diagramming application, which many administrators use to create network diagrams. It also ships with some Office packages.

In a security bulletin released yesterday, Microsoft describes two security vulnerabilities that affect all current versions of Visio. The vulnerabilities differ technically, but share the same scope and impact. They both involve flaws in how Visio parses Visio documents. If an attacker can entice one of your users into opening a specially crafted Visio file (such as .vsd, .vdx, .vst, or .vtx), he could exploit either of these flaws to execute code on that user’s computer with that user’s  privileges. If your user has administrative privileges, the attacker could gain complete control of their computer.

Solution Path:

Microsoft has released Visio patches to fix this flaw. You should download, test, and deploy the appropriate patches as soon as possible, or let Windows Update do it for you.

For All WatchGuard Users:

If the practice fits your business environment, you can use the HTTP, SMTP, and/or POP3 proxies to block Visio documents by extension (such as .vsd, .vdx, .vst, or .vtx). However, doing so blocks both malicious and legitimate file.

If you would like to use our proxies to block Visio documents, follow the links below for instructions:

Status:

Microsoft has released a fix.

References:

This alert was researched and written by Corey Nachreiner, CISSP.


What did you think of this alert? Let us know at your.opinion.matters@watchguard.com.

More alerts and articles: Log into the LiveSecurity Archive.

Exit mobile version