{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"AIX 5.3 configur\u00e9 en client NIS ;","product":{"name":"AIX","vendor":{"name":"IBM","scada":false}}},{"description":"Les versions ant\u00e9rieures ne sont pas affect\u00e9es.","product":{"name":"AIX","vendor":{"name":"IBM","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUn utilisateur mal intentionn\u00e9 distant peut obtenir un acc\u00e8s avec les\nprivil\u00e8ges du superutilisateur root sur un syst\u00e8me configur\u00e9 en tant que\nclient du protocole NIS.\n\n## Solution\n\nLe correctif APAR IY68825 corrige cette faille de s\u00e9curit\u00e9.\n","cves":[],"links":[{"title":"Avis de s\u00e9curit\u00e9 IBM :","url":"http://www-1.ibm.com/support/docview.ws?uid=isg1SSRVAIX53SECUR81511_191"}],"reference":"CERTA-2005-AVI-299","revisions":[{"description":"version initiale.","revision_date":"2005-08-08T00:00:00.000000"}],"risks":[{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":null,"title":"Vuln\u00e9rabilit\u00e9 de AIX","vendor_advisories":[{"published_at":null,"title":"Avis IBM : APAR IY68825","url":null}]}
