First published: Mon Dec 11 2023(Updated: )
Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.
Credit: security@documentfoundation.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/LibreOffice | <7.5.9 | 7.5.9 |
redhat/LibreOffice | <7.6.4 | 7.6.4 |
debian/libreoffice | 1:7.0.4-4+deb11u10 4:7.4.7-1+deb12u4 4:24.2.5-4 4:24.2.6-1 | |
LibreOffice Draw | >=7.5.0<7.5.9 | |
LibreOffice Draw | >=7.6.0<7.6.4 | |
Fedora | =38 | |
Debian | =11.0 | |
Debian | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6186 has a medium severity rating allowing execution of macros without warning.
To fix CVE-2023-6186, update LibreOffice to version 7.5.9 or 7.6.4 or higher.
CVE-2023-6186 affects LibreOffice versions prior to 7.5.9 and versions prior to 7.6.4.
Yes, CVE-2023-6186 can potentially be exploited remotely through malicious documents.
Users of LibreOffice with CVE-2023-6186 may experience unauthorized macro execution leading to potential data loss or compromise.