{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Microsoft Windows XP ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows Server 2003.","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows 2000 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows NT 4.0 Server ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows NT 4.0, Terminal Server Edition ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nNetBIOS (Network Basic Input/Output) est un protocole r\u00e9seau qui peut\nfonctionner au dessus du protocole TCP : NetBT (NetBIOS over TCP). NBNS\n(NetBT Name Service) est un service permettant la r\u00e9solution de noms\nNetBIOS (\u00e9quivalent au service DNS pour le protocole TCP). Dans\ncertaines conditions, une r\u00e9ponse NBNS peut contenir des donn\u00e9es issues\nde la m\u00e9moire, en plus de la r\u00e9ponse l\u00e9gitime.\n\n## Solution\n\nAppliquer le correctif propos\u00e9 par Microsoft.\n","cves":[],"links":[],"reference":"CERTA-2003-AVI-144","revisions":[{"description":"version initiale.","revision_date":"2003-09-04T00:00:00.000000"}],"risks":[{"description":"Divulgation d'informations"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans le syst\u00e8me de r\u00e9solution de noms du protocole\nr\u00e9seau NetBIOS permet \u00e0 un utilisateur mal intentionn\u00e9 d'avoir acc\u00e8s \u00e0\ndes informations r\u00e9sidant dans la m\u00e9moire de la machine victime.\n","title":"Vuln\u00e9rabilit\u00e9 de NetBIOS","vendor_advisories":[{"published_at":null,"title":"Avis de s\u00e9curit\u00e9 Microsoft MS03-034","url":"http://www.microsoft.com/technet/security/bulletin/MS03-034.asp"}]}
