2-minute read
Tableau recently released a list of security patches covering a variety of vulnerabilities in Tableau Desktop. The list featured mainly high-severity concerns, with only one of the six items listed as less severe.
High severity
Trigger:Â Any authenticated user publishes a workbook to Tableau Server
Possible Result:Â Arbitrary code execution or crashing of software
Trigger:Â NTLM web authentication
Possible Result:Â Improper read/write allows remote code execution or crashing of software
Partial information disclosure in thumbnails
Trigger:Â Published workbook connects to published data source that includes user functions
Possible Result:Â Users without proper permissions may be exposed to classified information
pgsqlODBC driver contains a heap-based buffer overflow
Trigger:Â psqlODBC driver shipped with Tableau Server has a buffer overflow and must be updated
Possible Result:Â Arbitrary code execution or crashing of software
Tableau Desktop on Mac memory corruption
Trigger:Â A Mac user connects to malicious Web Data Connector (WDC)
Possible Result:Â Arbitrary code execution or crashing of software
Medium severity
Web data connectors ignore secondary safe list for incremental refresh
Trigger:Â Performing an incremental refresh does not properly evaluate WDC URL safe list
Possible Result: Malicious WDC code can make requests to unapproved URL’s
To read about installing Tableau Desktop, check out their installation guide. If you’d like to upgrade software you already have, head over to the Tableau Desktop upgrade page.