{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<UL>    <LI>Advantage Data Transport 3.0 ;</LI>    <LI>BrightStor SAN Manager 1.1 ;</LI>    <LI>BrightStor SAN Manager 1.1 SP1 ;</LI>    <LI>BrightStor SAN Manager 1.1 SP2 ;</LI>    <LI>BrightStor SAN Manager 11.1 ;</LI>    <LI>BrightStor Portal 11.1 ;</LI>    <LI>CleverPath OLAP 5.1 ;</LI>    <LI>CleverPath ECM 3.5 ;</LI>    <LI>CleverPath Predictive Analysis Server 2.0 ;</LI>    <LI>CleverPath Predictive Analysis Server 3.0 ;</LI>    <LI>CleverPath Aion 10.0 ;</LI>    <LI>eTrust Admin 2.01 ;</LI>    <LI>eTrust Admin 2.04 ;</LI>    <LI>eTrust Admin 2.07 ;</LI>    <LI>eTrust Admin 2.09 ;</LI>    <LI>eTrust Admin 8.0 ;</LI>    <LI>eTrust Admin 8.1 ;</LI>    <LI>Unicenter Application Performance Monitor 3.0 ;</LI>    <LI>Unicenter Application Performance Monitor 3.5 ;</LI>    <LI>Unicenter Asset Management 3.1 ;</LI>    <LI>Unicenter Asset Management 3.2 ;</LI>    <LI>Unicenter Asset Management 3.2 SP1 ;</LI>    <LI>Unicenter Asset Management 3.2 SP2 ;</LI>    <LI>Unicenter Asset Management 4.0 ;</LI>    <LI>Unicenter Asset Management 4.0 SP1 ;</LI>    <LI>Unicenter Data Transport Option 2.0 ;</LI>    <LI>Unicenter Enterprise Job Manager 1.0 SP1 ;</LI>    <LI>Unicenter Enterprise Job Manager 1.0 SP2 ;</LI>    <LI>Unicenter Jasmine 3.0 ;</LI>    <LI>Unicenter Management for WebSphere MQ 3.5 ;</LI>    <LI>Unicenter Management for Microsoft Exchange 4.0 ;</LI>    <LI>Unicenter Management for Microsoft Exchange 4.1 ;</LI>    <LI>Unicenter Management for Lotus Notes/Domino 4.0 ;</LI>    <LI>Unicenter Management for Web Servers 5 ;</LI>    <LI>Unicenter Management for Web Servers 5.0.1 ;</LI>    <LI>Unicenter NSM 3.0 ;</LI>    <LI>Unicenter NSM 3.1 ;</LI>    <LI>Unicenter NSM Wireless Network Management Option 3.0 ;</LI>    <LI>Unicenter Remote Control 6.0 ;</LI>    <LI>Unicenter Remote Control 6.0 SP1 ;</LI>    <LI>Unicenter Service Level Management 3.0 ;</LI>    <LI>Unicenter Service Level Management 3.0.1 ;</LI>    <LI>Unicenter Service Level Management 3.0.2 ;</LI>    <LI>Unicenter Service Level Management 3.5 ;</LI>    <LI>Unicenter Software Delivery 3.0 ;</LI>    <LI>Unicenter Software Delivery 3.1 ;</LI>    <LI>Unicenter Software Delivery 3.1 SP1 ;</LI>    <LI>Unicenter Software Delivery 3.1 SP2 ;</LI>    <LI>Unicenter Software Delivery 4.0 ;</LI>    <LI>Unicenter Software Delivery 4.0 SP1 ;</LI>    <LI>Unicenter TNG 2.1 ;</LI>    <LI>Unicenter TNG 2.2 ;</LI>    <LI>Unicenter TNG 2.4 ;</LI>    <LI>Unicenter TNG 2.4.2 ;</LI>    <LI>Unicenter TNG JPN 2.2.      <P>Ces Produits sont vuln\u00e9rables dans leurs version pour les      syst\u00e8mes d'exploitation suivant : AIX, DG Intel, DG Motorola,      DYNIX, OSF1, HP-UX, IRIX, Linux Intel, Linux s/390, Solaris      Intel, Solaris Sparc, UnixWare et Windows.</P>    </LI>  </UL>","content":"## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s affectent le module CAM pr\u00e9sent dans plusieurs\nproduits de Computer Associates. Ces vuln\u00e9rabilit\u00e9s, une fois\nexploit\u00e9es, conduisent \u00e0 un d\u00e9ni des service du produit concern\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2006-0530","url":"https://www.cve.org/CVERecord?id=CVE-2006-0530"},{"name":"CVE-2006-0529","url":"https://www.cve.org/CVERecord?id=CVE-2006-0529"}],"links":[{"title":"R\u00e9f\u00e9rences et correctifs de l'\u00e9diteur :","url":"http://supportconnectw.ca.com/public/ca_common_docs/camessagsecurity_cam107fixes.asp"},{"title":"R\u00e9f\u00e9rences et correctifs de l'\u00e9diteur :","url":"http://supportconnectw.ca.com/public/ca_common_docs/camessagsecurity_cam111fixes.asp"}],"reference":"CERTA-2006-AVI-057","revisions":[{"description":"version initiale.","revision_date":"2006-02-07T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"}],"summary":null,"title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Computer Associate","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 de Computer Associate","url":null}]}
