{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Cisco Security Agent (CSA) 4.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco IP Call Center Express (IPCC Express) ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Conference Connection (CCC) 1.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Unified MeetingPlace 4.x.","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Unified Communications Manager 6.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Personal Assistant Version 1.3x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Unified Communications Manager 5.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco IP Interactive Voice Response (IP IVR) ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Personal Assistant Version 1.4x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Unified Communications Manager 4.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Security Agent (CSA) 5.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Emergency Responder (CER) 1.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 est pr\u00e9sente dans le logiciel Security Agent pour\nMicrosoft Windows de Cisco. Elle est relative \u00e0 un pilote utilis\u00e9 par\nl'application et permet \u00e0 un utilisateur distant de provoquer un d\u00e9ni de\nservice ou d'ex\u00e9cuter du code arbitraire par le biais de paquets\nparticuliers envoy\u00e9s sur les ports 139/tcp ou 445/tcp de la machine\nvuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Cisco ID 99837 du 05 d\u00e9cembre 2007 :","url":"http://www.cisco.com/warp/public/707/cisco-sa-20071205-csa.shtml"}],"reference":"CERTA-2007-AVI-529","revisions":[{"description":"version initiale.","revision_date":"2007-12-07T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans Cisco Security Agent permet \u00e0 un utilisateur\ndistant de provoquer un d\u00e9ni de service ou d'ex\u00e9cuter du code\narbitraire.\n","title":"Vuln\u00e9rabilit\u00e9 dans Cisco Security Agent","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco #99837 du 05 d\u00e9cembre 2007","url":null}]}
