CVE-2018-8582
Summary
| CVE | CVE-2018-8582 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-11-14 01:29:00 UTC |
| Updated | 2020-08-24 17:37:00 UTC |
| Description | A remote code execution vulnerability exists in the way that Microsoft Outlook parses specially modified rule export files, aka "Microsoft Outlook Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook. This CVE ID is unique from CVE-2018-8522, CVE-2018-8524, CVE-2018-8576. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Microsoft | Office 365 Proplus | - | All | All | All |
| Application | Microsoft | Office 365 Proplus | - | All | All | All |
| Application | Microsoft | Outlook | 2010 | sp2 | All | All |
| Application | Microsoft | Outlook | 2013 | sp1 | All | All |
| Application | Microsoft | Outlook | 2016 | All | All | All |
| Application | Microsoft | Outlook | 2010 | sp2 | All | All |
| Application | Microsoft | Outlook | 2013 | sp1 | All | All |
| Application | Microsoft | Outlook | 2016 | All | All | All |
| Application | Microsoft | Outlook Rt | 2013 | sp1 | All | All |
| Application | Microsoft | Outlook Rt | 2013 | sp1 | All | All |
| Operating System | Microsoft | Windows Server 2019 | - | All | All | All |
| Operating System | Microsoft | Windows Server 2019 | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 105825 | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Microsoft Outlook Files Processing Flaws and Export File Processing Flaw Lets Remote Users Execute Arbitrary Code - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8582 | CONFIRM | portal.msrc.microsoft.com | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.