A vulnerability in LibreOffice hyperlink processing allows an attacker to construct documents containing hyperlinks pointing to the location of an executable on the target users file system. If the hyperlink is activated by the victim the executable target is unconditionally launched. Under Windows and macOS when processing a hyperlink target explicitly activated by the user there was no judgment made on whether the target was an executable file, so such executable targets were launched unconditionally. This issue affects: All LibreOffice Windows and macOS versions prior to 6.1.6; LibreOffice Windows and macOS versions in the 6.2 series prior to 6.2.3.
References
Link | Resource |
---|---|
https://www.libreoffice.org/about-us/security/advisories/cve-2019-9847/ | Vendor Advisory |
https://www.libreoffice.org/about-us/security/advisories/cve-2019-9847/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.libreoffice.org/about-us/security/advisories/cve-2019-9847/ - Vendor Advisory |
Information
Published : 2019-05-09 14:29
Updated : 2024-11-21 04:52
NVD link : CVE-2019-9847
Mitre link : CVE-2019-9847
CVE.ORG link : CVE-2019-9847
JSON object : View
Products Affected
apple
- macos
microsoft
- windows
libreoffice
- libreoffice
CWE
CWE-20
Improper Input Validation