Fortinet Discovers Tableau Server and Tableau Desktop Heap Corruption Vulnerability


Fortinet's FortiGuard Labs has discovered a Heap Corruption vulnerability in Tableau Software's Tableau Desktop and Tableau Server.

Tableau Desktop and Tableau Server are data visualization software that lets you see and understand data in minutes. They can connect to almost any database, drag and drop to create visualizations, and share with a click.

A Heap Corruption vulnerability has been discovered in Tableau Desktop and Tableau Server. The vulnerability exists because the vulnerable software can't properly handle a crafted tbwx file which causes an out of bounds memory access. It could allow malicious users to create code execution scenarios.


FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:

Released Feb 27, 2018

Users should apply the solution provided by Tableau Software.


Fortinet reported the vulnerability to Tableau Software on January 3 , 2018.

Tableau Software confirmed the vulnerability on January 5, 2018.

Tableau Software patched the vulnerability on February 27, 2018.


This vulnerability was discovered by Kushal Arvind Shah of Fortinet's FortiGuard Labs.

IPS Subscription

Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be protected against this vulnerability with the appropriate configuration parameters in place. Fortinet's IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by FortiGuard Labs, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle.