First published: Fri Sep 27 2019(Updated: )
LibreOffice documents can contain macros. The execution of those macros is controlled by the document security settings, typically execution of macros are blocked by default. A URL decoding flaw existed in how the urls to the macros within the document were processed and categorized, resulting in the possibility to construct a document where macro execution bypassed the security settings. The documents were correctly detected as containing macros, and prompted the user to their existence within the documents, but macros within the document were subsequently not controlled by the security settings allowing arbitrary macro execution This issue affects: LibreOffice 6.2 series versions prior to 6.2.7; LibreOffice 6.3 series versions prior to 6.3.1.
Credit: security@documentfoundation.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/LibreOffice | <6.2.6 | 6.2.6 |
redhat/LibreOffice | <6.3.1 | 6.3.1 |
Libreoffice Libreoffice | >=6.2.0<6.2.6 | |
Libreoffice Libreoffice | >=6.3.0<6.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9853 is a vulnerability in LibreOffice that allows the execution of macros in documents, bypassing document security settings.
CVE-2019-9853 has a severity level of 7.8, which is considered high.
CVE-2019-9853 is caused by a URL decoding flaw in LibreOffice's processing and categorization of macros, allowing macros to execute despite security settings.
Versions 6.2.0 to 6.2.6 and versions 6.3.0 to 6.3.1 of LibreOffice are affected by CVE-2019-9853.
To fix CVE-2019-9853, update to LibreOffice version 6.2.6 or later, or version 6.3.1 or later.