First published: Wed Aug 15 2018(Updated: )
An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory, aka "Microsoft Office Information Disclosure Vulnerability." This affects Word, Microsoft SharePoint Server, Microsoft Office Word Viewer, Microsoft Excel Viewer, Microsoft SharePoint, Microsoft Office.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Excel Viewer | =2007-sp3 | |
Microsoft Office | =2010-sp2 | |
Microsoft Office | =2013-sp1 | |
Microsoft Office | =2013-sp1 | |
Microsoft Office | =2016 | |
Microsoft Office | =2016 | |
Microsoft Office Compatibility Pack | =sp3 | |
Microsoft Office Web Apps | =2010-sp2 | |
Microsoft Office Web Apps | =2013-sp1 | |
Microsoft Office Word Viewer | ||
Microsoft SharePoint Enterprise Server 2013 | =sp1 | |
Microsoft SharePoint Enterprise Server 2016 | ||
Microsoft SharePoint Server | =2013-sp1 | |
Microsoft Word Automation Services | ||
Microsoft SharePoint Server | =2010-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8378 is an information disclosure vulnerability in Microsoft Office software that allows an attacker to read out-of-bound memory and disclose its contents.
The software affected by CVE-2018-8378 includes Microsoft Excel Viewer 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Office Compatibility Pack SP3, Microsoft Office Web Apps 2010 SP2, Microsoft Office Web Apps 2013 SP1, Microsoft Office Word Viewer, Microsoft SharePoint Enterprise Server 2013 SP1, Microsoft SharePoint Enterprise Server 2016, and Microsoft SharePoint Server 2013 SP1.
CVE-2018-8378 has a severity rating of 5.5 (medium).
The CWE codes for CVE-2018-8378 are CWE-125 (Out-of-bounds Read) and CWE-908 (Use of Uninitialized Variable).
You can find more information about CVE-2018-8378 on the SecurityFocus website and the Microsoft Security Guidance Advisory.