First published: Wed Nov 14 2018(Updated: )
A remote code execution vulnerability exists in the way that Microsoft Outlook parses specially modified rule export files, aka "Microsoft Outlook Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook. This CVE ID is unique from CVE-2018-8522, CVE-2018-8524, CVE-2018-8576.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office 365 Proplus | ||
Microsoft Outlook | =2010-sp2 | |
Microsoft Outlook | =2013-sp1 | |
Microsoft Outlook | =2016 | |
Microsoft Outlook Rt | =2013-sp1 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8582 is a remote code execution vulnerability in Microsoft Outlook.
Office 365 ProPlus, Microsoft Office, and Microsoft Outlook versions 2010 SP2, 2013 SP1, 2016, and Outlook RT 2013 SP1 are affected.
CVE-2018-8582 has a severity rating of 8.8 (Critical).
CVE-2018-8582 exploits a vulnerability in the way Microsoft Outlook parses specially modified rule export files, allowing remote code execution.
Update affected software to the latest available version from Microsoft to mitigate CVE-2018-8582.