{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Syslog-ng Premium Edition versions ant\u00e9rieures \u00e0 2.1.8.","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Syslog-ng Open Source Edition versions ant\u00e9rieures \u00e0 2.0.6 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUn d\u00e9faut de contr\u00f4le des informations trait\u00e9es par Syslog-ng permet \u00e0\nun utilisateur distant de r\u00e9aliser un d\u00e9ni de service par le biais d'un\nmessage sp\u00e9cialement construit.\n\n## Solution\n\nLes versions 2.0.6 de Syslog-ng Open Source Edition et 2.1.8 de\nSyslog-ng Premium Edition corrigent le probl\u00e8me. Se r\u00e9f\u00e9rer au site\nofficiel de l'\u00e9diteur pour l'obtention des correctifs (cf. section\nDocumentation).\n","cves":[{"name":"CVE-2007-6437","url":"https://www.cve.org/CVERecord?id=CVE-2007-6437"}],"links":[{"title":"Site officiel de Syslog-ng :","url":"http://www.balabit.com/network-security/syslog-ng/"}],"reference":"CERTA-2007-AVI-572","revisions":[{"description":"version initiale.","revision_date":"2007-12-31T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans Syslog-ng permet de r\u00e9aliser un d\u00e9ni de service \u00e0\ndistance.\n","title":"Vuln\u00e9rabilit\u00e9 dans Syslog-ng","vendor_advisories":[{"published_at":null,"title":"R\u00e9f\u00e9rence CVE CVE-2007-6437 du 19 d\u00e9cembre 2007","url":null}]}
