First published: Wed Nov 14 2018(Updated: )
A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory, aka "Microsoft Outlook Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook. This CVE ID is unique from CVE-2018-8522, CVE-2018-8576, CVE-2018-8582.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office | =2019 | |
Microsoft Office 365 Proplus | ||
Microsoft Outlook | =2010-sp2 | |
Microsoft Outlook | =2013-sp1 | |
Microsoft Outlook | =2016 | |
Microsoft Outlook Rt | =2013-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8524 is a remote code execution vulnerability that exists in Microsoft Outlook software when it fails to properly handle objects in memory.
CVE-2018-8524 affects Office 365 ProPlus, Microsoft Office 2019, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, Microsoft Outlook 2016, and Microsoft Outlook RT 2013 SP1.
CVE-2018-8524 has a severity rating of 7.8 (out of 10), which is considered critical.
To fix CVE-2018-8524, it is recommended to apply the latest security updates provided by Microsoft for the affected software versions.
You can find more information about CVE-2018-8524 on the following websites: [SecurityFocus](http://www.securityfocus.com/bid/105823), [SecurityTracker](http://www.securitytracker.com/id/1042110), [Microsoft Security Guidance Advisory](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8524).