First published: Wed Nov 14 2018(Updated: )
A flaw was found in libreoffice. If a document does not contain macros/scripts, but references a pre-installed macro/script execution of those macros/scripts, execution is allowed without warning bypassing normal behavior.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libreoffice Libreoffice | <6.0.7 | |
Libreoffice Libreoffice | >=6.1.0<6.1.3 | |
redhat/libreoffice | <6.0.7 | 6.0.7 |
redhat/libreoffice | <6.1.3 | 6.1.3 |
ubuntu/libreoffice | <1:4.2.8-0ubuntu5.5 | 1:4.2.8-0ubuntu5.5 |
ubuntu/libreoffice | <6.0.7 | 6.0.7 |
ubuntu/libreoffice | <1:5.1.6~ | 1:5.1.6~ |
debian/libreoffice | 1:7.0.4-4+deb11u9 1:7.0.4-4+deb11u10 4:7.4.7-1+deb12u3 4:7.4.7-1+deb12u4 4:24.2.5-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16858 is a vulnerability in LibreOffice that allows for a directory traversal attack, potentially leading to the execution of arbitrary macros.
This vulnerability can be exploited by crafting a document that, when opened by LibreOffice, executes a Python method from a script in a malicious document.
The severity of CVE-2018-16858 is rated as critical with a CVSS score of 9.8.
LibreOffice versions before 6.0.7 and 6.1.3 are affected by CVE-2018-16858.
To mitigate the vulnerability, it is recommended to update to LibreOffice versions 6.0.7 or 6.1.3, depending on the version in use.