{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Symantec Mail Security for SMTP version 5.0.0 ;","product":{"name":"N/A","vendor":{"name":"Symantec","scada":false}}},{"description":"Symantec Mail Security for SMTP version 5.0.1 ;","product":{"name":"N/A","vendor":{"name":"Symantec","scada":false}}},{"description":"Symantec Mail Security for Microsoft Exchange version 5.0 ;","product":{"name":"N/A","vendor":{"name":"Symantec","scada":false}}},{"description":"Symantec Mail Security for Domino version 7.5 ;","product":{"name":"N/A","vendor":{"name":"Symantec","scada":false}}},{"description":"Symantec Mail Security Appliance versions 5.0.x.","product":{"name":"N/A","vendor":{"name":"Symantec","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s de type d\u00e9bordement de m\u00e9moire ont \u00e9t\u00e9\nd\u00e9couvertes dans le module Autonomy KeyView de Symantec Mail Security.\nCe module est utilis\u00e9 pour r\u00e9aliser du filtrage de contenu.\nL'exploitation de ces vuln\u00e9rabilit\u00e9s permet l'ex\u00e9cution de code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[],"links":[],"reference":"CERTA-2008-AVI-198","revisions":[{"description":"version initiale.","revision_date":"2008-04-10T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Plusieurs vuln\u00e9rabilit\u00e9s dans <span class=\"textit\">Symantec Mail\nSecurity</span> permettent l'ex\u00e9cution de code arbitraire \u00e0 distance.\n","title":"Vuln\u00e9rabilit\u00e9s dans Symantec Mail Security","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Symantec SYM08-010 du 08 avril 2008","url":"http://securityresponse.symantec.com/avcenter/security/Content/2008.04.08e.html"}]}
