{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"leurs versions ant\u00e9rieures.","product":{"name":"Management Center","vendor":{"name":"Broadcom","scada":false}}},{"description":"HP Intelligent Management Center PLAT 5.0 (E0101),","product":{"name":"Management Center","vendor":{"name":"Broadcom","scada":false}}},{"description":"HP Intelligent Management Center PLAT 5.0 (E0101L01),","product":{"name":"Management Center","vendor":{"name":"Broadcom","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans HP Intelligent\nManagement Center :\n\n-   plusieurs vuln\u00e9rabilit\u00e9s de type d\u00e9passement de tampon,\n-   une vuln\u00e9rabilit\u00e9 permettant \u00e0 un attaquant de d\u00e9poser des fichiers\n    arbitraires,\n-   une vuln\u00e9rabilit\u00e9 de type corruption de m\u00e9moire.\n\nCes vuln\u00e9rabilit\u00e9s sont exploitables par l'envoi de paquets r\u00e9seaux\nsp\u00e9cialement con\u00e7us, et peuvent toutes conduire \u00e0 l'ex\u00e9cution de code\narbitraire par l'attaquant.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2011-1852","url":"https://www.cve.org/CVERecord?id=CVE-2011-1852"},{"name":"CVE-2011-1849","url":"https://www.cve.org/CVERecord?id=CVE-2011-1849"},{"name":"CVE-2011-1850","url":"https://www.cve.org/CVERecord?id=CVE-2011-1850"},{"name":"CVE-2011-1848","url":"https://www.cve.org/CVERecord?id=CVE-2011-1848"},{"name":"CVE-2011-1851","url":"https://www.cve.org/CVERecord?id=CVE-2011-1851"},{"name":"CVE-2011-1854","url":"https://www.cve.org/CVERecord?id=CVE-2011-1854"},{"name":"CVE-2011-1853","url":"https://www.cve.org/CVERecord?id=CVE-2011-1853"}],"links":[],"reference":"CERTA-2011-AVI-288","revisions":[{"description":"version initiale.","revision_date":"2011-05-12T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans HP Intelligent\nManagement Center, qui permettent \u00e0 un attaquant d'ex\u00e9cuter du code\narbitraire \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans HP Intelligent Management Center","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 HP c02822750 du 05 mai 2011","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02822750"}]}
