{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Routeurs VPN s\u00e9rie 1000 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Routeurs VPN s\u00e9rie 2000 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Routeurs VPN s\u00e9rie 5000 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Routeurs VPN s\u00e9rie 600.","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Routeurs VPN s\u00e9rie 4000 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 dans la mise en \u0153uvre de VPN (Virtual Private Chanel)\nIPSec (Internet Protocol Security) des routeurs Nortel permet \u00e0 un\nutilisateur distant mal intentionn\u00e9 de provoquer un d\u00e9ni de service par\nle biais d'un paquet IKE (Internet Key Exchange) malicieusement\nconstruit.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. Documentation).\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Nortel du 27 mai 2005 :","url":"http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?BV_SessionID=@@@@1396235007.1117611957@@@@&BV_EngineID=fadddjddelhkbhkcginchgcgio.0&level=6&category=8&subcategory=7&subtype=&DocumentOID=328562&RenditionID=REND275816"}],"reference":"CERTA-2005-AVI-187","revisions":[{"description":"version initiale.","revision_date":"2005-06-01T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"}],"summary":"Une vuln\u00e9rabilit\u00e9 des routeurs Nortell permet \u00e0 un utilisateur distant\nmal intentionn\u00e9 de provoquer un d\u00e9ni de service.\n","title":"Vuln\u00e9rabilit\u00e9 des routeurs Nortel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 de Nortel 27 mai 2005","url":null}]}
