{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"points d'acc\u00e8s de la s\u00e9rie Cisco Aironet 350 ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"points d'acc\u00e8s de la s\u00e9rie Cisco Aironet 1200 ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"commutateurs de la s\u00e9rie Cisco CSS1000 ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Routeurs de la s\u00e9rie Cisco SN5400 ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"commutateurs WAN de la s\u00e9rie Cisco MGX.","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nCertaines impl\u00e9mentations de l'option Timestamp du protocole TCP sont\nvuln\u00e9rables \u00e0 un d\u00e9ni de service. Des paquets malicieusement construits\nenvoy\u00e9s sur un \u00e9quipement vuln\u00e9rable peuvent bloquer une connexion TCP\npr\u00e9d\u00e9termin\u00e9e.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 du constructeur pour l'obtention du\ncorrectif.\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Cisco \"Vulnerability in a Variant of    the TCP timestamps option\" :","url":"http://cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml"}],"reference":"CERTA-2005-AVI-173","revisions":[{"description":"version initiale.","revision_date":"2005-05-23T00:00:00.000000"},{"description":"ajout de la r\u00e9f\u00e9rence CVE.","revision_date":"2005-05-27T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"}],"summary":null,"title":"Vuln\u00e9rabilit\u00e9 de l'option TCP Timestamp sur plusieurs produits Cisco","vendor_advisories":[{"published_at":null,"title":"Avis de s\u00e9curit\u00e9 Cisco du 18 mai 2005","url":null}]}
