First published: Wed May 08 2019(Updated: )
A vulnerability in LibreOffice hyperlink processing allows an attacker to construct documents containing hyperlinks pointing to the location of an executable on the target users file system. If the hyperlink is activated by the victim the executable target is unconditionally launched. Under Windows and macOS when processing a hyperlink target explicitly activated by the user there was no judgment made on whether the target was an executable file, so such executable targets were launched unconditionally. This issue affects: All LibreOffice Windows and macOS versions prior to 6.1.6; LibreOffice Windows and macOS versions in the 6.2 series prior to 6.2.3.
Credit: security@documentfoundation.org
Affected Software | Affected Version | How to fix |
---|---|---|
The Document Foundation LibreOffice | <6.1.6 | |
The Document Foundation LibreOffice | >=6.2<6.2.3 | |
Apple macOS | ||
Microsoft Windows |
Upgrade to LibreOffice 6.1.6 or 6.2.3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9847 is a vulnerability in LibreOffice hyperlink processing that allows an attacker to construct documents containing hyperlinks pointing to the location of an executable on the target users file system.
CVE-2019-9847 works by activating a hyperlink in a document, which then launches an executable on the victim's file system.
LibreOffice versions up to and including 6.1.6 and versions from 6.2 to 6.2.3 are affected by CVE-2019-9847.
No, Apple macOS is not vulnerable to CVE-2019-9847.
No, Microsoft Windows is not vulnerable to CVE-2019-9847.