{"id":14250,"date":"2019-01-06T14:19:09","date_gmt":"2019-01-06T22:19:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/01\/06\/news-8002\/"},"modified":"2019-01-06T14:19:09","modified_gmt":"2019-01-06T22:19:09","slug":"news-8002","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/01\/06\/news-8002\/","title":{"rendered":"SSD Advisory \u2013 Apache OpenOffice Virtual Table Corruption"},"content":{"rendered":"<p><strong>Credit to Author: SSD \/ Ori Nimron| Date: Sun, 06 Jan 2019 07:40:33 +0000<\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/3758\" target=\"bwo\" >https:\/\/blogs.securiteam.com\/index.php\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: SSD \/ Ori Nimron| Date: Sun, 06 Jan 2019 07:40:33 +0000<\/strong><\/p>\n<p>Vulnerabilities Summary The following advisory discusses a vulnerability found in Apache OpenOffice. The vulnerability lays inside the part that responsible for parsing documents, which contains has an overflow that let attackers take control over program execution. Vendor Response &#8220;We obtained a CVE number for the vulnerability you reported: CVE-2018-11790. The release will need to undergo &#8230; <a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/3758\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SSD Advisory \u2013 Apache OpenOffice Virtual Table Corruption<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10754],"tags":[10757],"class_list":["post-14250","post","type-post","status-publish","format-standard","hentry","category-independent","category-securiteam","tag-securiteam-secure-disclosure"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14250"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14250\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14250"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}