Vulnerabilities > CVE-2007-0934 - Unspecified vulnerability in Microsoft Visio 2002
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Unspecified vulnerability in Microsoft Visio 2002 allows remote user-assisted attackers to execute arbitrary code via a Visio (.VSD, VSS, .VST) file with a crafted version number that triggers memory corruption.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS07-030.NASL |
description | The remote host contains a version of Microsoft Visio that has a vulnerability in the way it handles packed objects and version numbers that could be abused by an attacker to execute arbitrary code on the remote host. To exploit this vulnerability, an attacker would need to spend a specially crafted visio document to a user on the remote host and lure him into opening it. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25489 |
published | 2007-06-14 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25489 |
title | MS07-030: Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (927051) |
code |
|
Oval
accepted | 2013-02-11T04:02:21.799-05:00 | ||||||||||||||||
class | vulnerability | ||||||||||||||||
contributors |
| ||||||||||||||||
definition_extensions |
| ||||||||||||||||
description | Unspecified vulnerability in Microsoft Visio 2002 allows remote user-assisted attackers to execute arbitrary code via a Visio (.VSD, VSS, .VST) file with a crafted version number that triggers memory corruption. | ||||||||||||||||
family | windows | ||||||||||||||||
id | oval:org.mitre.oval:def:1925 | ||||||||||||||||
status | accepted | ||||||||||||||||
submitted | 2007-06-12T16:59:33.000-04:00 | ||||||||||||||||
title | Version Number Memory Corruption Vulnerability | ||||||||||||||||
version | 6 |
References
- http://osvdb.org/35342
- http://osvdb.org/35342
- http://secunia.com/advisories/25619
- http://secunia.com/advisories/25619
- http://www.securityfocus.com/archive/1/471947/100/0/threaded
- http://www.securityfocus.com/archive/1/471947/100/0/threaded
- http://www.securityfocus.com/archive/1/471947/100/0/threaded
- http://www.securityfocus.com/archive/1/471947/100/0/threaded
- http://www.securityfocus.com/bid/24349
- http://www.securityfocus.com/bid/24349
- http://www.securitytracker.com/id?1018227
- http://www.securitytracker.com/id?1018227
- http://www.us-cert.gov/cas/techalerts/TA07-163A.html
- http://www.us-cert.gov/cas/techalerts/TA07-163A.html
- http://www.vupen.com/english/advisories/2007/2150
- http://www.vupen.com/english/advisories/2007/2150
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-030
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-030
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34607
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34607
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1925
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1925