{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"VMware ESX version 4.0","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESX version 4.1","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCenter Server version 5.1","product":{"name":"vCenter Server","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESXi version 3.5","product":{"name":"ESXi","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESXi version 5.0","product":{"name":"ESXi","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESXi version 5.1","product":{"name":"ESXi","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESX version 3.5","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESXi version 4.1","product":{"name":"ESXi","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESXi version 4.0","product":{"name":"ESXi","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCenter Server version 5.0","product":{"name":"vCenter Server","vendor":{"name":"VMware","scada":false}}},{"description":"VMware VirtualCenter version 4.0","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCenter Server version 4.0","product":{"name":"vCenter Server","vendor":{"name":"VMware","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2011-4609","url":"https://www.cve.org/CVERecord?id=CVE-2011-4609"},{"name":"CVE-2012-4244","url":"https://www.cve.org/CVERecord?id=CVE-2012-4244"},{"name":"CVE-2012-2110","url":"https://www.cve.org/CVERecord?id=CVE-2012-2110"},{"name":"CVE-2009-5064","url":"https://www.cve.org/CVERecord?id=CVE-2009-5064"},{"name":"CVE-2009-5029","url":"https://www.cve.org/CVERecord?id=CVE-2009-5029"},{"name":"CVE-2011-3970","url":"https://www.cve.org/CVERecord?id=CVE-2011-3970"},{"name":"CVE-2012-2871","url":"https://www.cve.org/CVERecord?id=CVE-2012-2871"},{"name":"CVE-2012-3404","url":"https://www.cve.org/CVERecord?id=CVE-2012-3404"},{"name":"CVE-2012-2870","url":"https://www.cve.org/CVERecord?id=CVE-2012-2870"},{"name":"CVE-2013-1405","url":"https://www.cve.org/CVERecord?id=CVE-2013-1405"},{"name":"CVE-2012-6324","url":"https://www.cve.org/CVERecord?id=CVE-2012-6324"},{"name":"CVE-2011-3102","url":"https://www.cve.org/CVERecord?id=CVE-2011-3102"},{"name":"CVE-2012-3406","url":"https://www.cve.org/CVERecord?id=CVE-2012-3406"},{"name":"CVE-2010-0830","url":"https://www.cve.org/CVERecord?id=CVE-2010-0830"},{"name":"CVE-2012-0864","url":"https://www.cve.org/CVERecord?id=CVE-2012-0864"},{"name":"CVE-2012-6326","url":"https://www.cve.org/CVERecord?id=CVE-2012-6326"},{"name":"CVE-2013-1659","url":"https://www.cve.org/CVERecord?id=CVE-2013-1659"},{"name":"CVE-2012-2807","url":"https://www.cve.org/CVERecord?id=CVE-2012-2807"},{"name":"CVE-2012-3405","url":"https://www.cve.org/CVERecord?id=CVE-2012-3405"},{"name":"CVE-2012-3480","url":"https://www.cve.org/CVERecord?id=CVE-2012-3480"},{"name":"CVE-2012-6325","url":"https://www.cve.org/CVERecord?id=CVE-2012-6325"},{"name":"CVE-2011-1202","url":"https://www.cve.org/CVERecord?id=CVE-2011-1202"},{"name":"CVE-2011-1089","url":"https://www.cve.org/CVERecord?id=CVE-2011-1089"},{"name":"CVE-2012-2825","url":"https://www.cve.org/CVERecord?id=CVE-2012-2825"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 VMware VMSA-2013-0003 VMSA-2012-0018    VMSA-2013-0001 du 21 f\u00e9vrier 2013","url":"http://www.vmware.com/security/advisories/VMSA-2012-0018.html"},{"title":"Bulletin de s\u00e9curit\u00e9 VMware VMSA-2013-0003 VMSA-2012-0018    VMSA-2013-0001 du 21 f\u00e9vrier 2013","url":"http://www.vmware.com/security/advisories/VMSA-2013-0001.html"},{"title":"Bulletin de s\u00e9curit\u00e9 VMware VMSA-2013-0003 VMSA-2012-0018    VMSA-2013-0001 du 21 f\u00e9vrier 2013","url":"http://www.vmware.com/security/advisories/VMSA-2013-0003.html"}],"reference":"CERTA-2013-AVI-146","revisions":[{"description":"version initiale.","revision_date":"2013-02-22T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits <span\nclass=\"textit\">VMware</span>. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un contournement\nde la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 VMware VMSA-2012-0018 du 21 f\u00e9vrier 2013","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 VMware VMSA-2013-0003 du 21 f\u00e9vrier 2013","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 VMware VMSA-2013-0001 du 21 f\u00e9vrier 2013","url":null}]}
