{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<P>Cisco IOS Software 12.X et d\u00e9riv\u00e9s.</P>","content":"## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans le syst\u00e8me d'exploitation\nIOS des \u00e9quipements Cisco. Ces failles sont relatives \u00e0 la mise en place\npar l'IOS :\n\n-   du Multicast Source Discovery ;\n-   du Network Address Translation ;\n-   des fonctionnalit\u00e9s d'optimisation du trafic ;\n-   du Internet Key Exchange (IKE) ;\n-   du Zone-Based Firewall ;\n-   du Reverse SSH ;\n-   du Smart Install ;\n-   du RSVP.\n-   de l'utilisation des commandes par HTTP ou HTTPS ;\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Cisco 20120328-ike du 28 mars 2012 :","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-ike"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco 20120328-smartinstall du 28 mars    2012 :","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-smartinstall"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco 20120328-ssh du 28 mars 2012 :","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-ssh"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco 20120328-pai du 28 mars 2012 :","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco 20120328-rsvp du 28 mars 2012 :","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-rsvp"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco 20120328-msdp du 28 mars 2012 :","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco 20120328-nat du 28 mars 2012 :","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-nat"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco 20120328-zbfw du 28 mars 2012 :","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-zbfw"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco 20120328-mace du 28 mars 2012 :","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-mace"}],"reference":"CERTA-2012-AVI-177","revisions":[{"description":"version initiale.","revision_date":"2012-03-29T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Cisco IOS Software</span>.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Cisco IOS Software","vendor_advisories":[{"published_at":null,"title":"Bulletins de s\u00e9curit\u00e9 Cisco du 28 mars 2012","url":null}]}
