First published: Sun Aug 05 2018(Updated: )
The get_app_path function in desktop/unx/source/start.c in LibreOffice through 6.0.5 mishandles the realpath function in certain environments such as FreeBSD libc, which might allow attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact if LibreOffice is automatically launched during web browsing with pathnames controlled by a remote web site.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libreoffice Libreoffice | <=6.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14939 refers to a vulnerability in LibreOffice versions up to 6.0.5 that mishandles the realpath function, leading to a possible denial of service or other impacts.
The severity of CVE-2018-14939 is critical with a CVSS score of 9.8.
CVE-2018-14939 affects LibreOffice versions up to 6.0.5 by causing a buffer overflow and application crash, potentially leading to a denial of service or other unspecified impacts.
To fix CVE-2018-14939, it is recommended to update LibreOffice to a version higher than 6.0.5.
You can find more information about CVE-2018-14939 at the following references: [SecurityFocus](http://www.securityfocus.com/bid/105047) and [DocumentFoundation](https://bugs.documentfoundation.org/show_bug.cgi?id=118514).