{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<P><SPAN class=\"textit\">Cisco TelePresence Video Communication  Server</SPAN> (<SPAN class=\"textit\">Control</SPAN>, <SPAN class=\n  \"textit\">Expressway</SPAN> et <SPAN class=\"textit\">Starter Pack  Express</SPAN>).</P>","content":"## Description\n\nDes vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans la gestion des paquets SIP\n(Session Initiation Protocol) dans Cisco TelePresence Video\nCommunication Server. L'exploitation de ces vuln\u00e9rabilit\u00e9s, par le biais\nde paquets SIP envoy\u00e9s au port 5060 et 5061 (TCP et UDP), permet de\nr\u00e9aliser un d\u00e9ni de service \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-0330","url":"https://www.cve.org/CVERecord?id=CVE-2012-0330"},{"name":"CVE-2012-0331","url":"https://www.cve.org/CVERecord?id=CVE-2012-0331"}],"links":[],"reference":"CERTA-2012-AVI-109","revisions":[{"description":"version initiale.","revision_date":"2012-03-01T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"}],"summary":"Des vuln\u00e9rabilit\u00e9s dans <span class=\"textit\">Cisco TelePresence Video\nCommunication Server</span> permettent de r\u00e9aliser un d\u00e9ni de service \u00e0\ndistance.\n","title":"Vuln\u00e9rabilit\u00e9s dans Cisco TelePresence Video Communication Server","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco 20120229-vcs du 29 f\u00e9vrier 2012","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-vcs"}]}
