{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Oracle Solaris 11.1","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Solaris 10","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Solaris 9","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-4184","url":"https://www.cve.org/CVERecord?id=CVE-2012-4184"},{"name":"CVE-2012-4183","url":"https://www.cve.org/CVERecord?id=CVE-2012-4183"},{"name":"CVE-2011-2939","url":"https://www.cve.org/CVERecord?id=CVE-2011-2939"},{"name":"CVE-2012-4179","url":"https://www.cve.org/CVERecord?id=CVE-2012-4179"},{"name":"CVE-2012-4181","url":"https://www.cve.org/CVERecord?id=CVE-2012-4181"},{"name":"CVE-2010-1158","url":"https://www.cve.org/CVERecord?id=CVE-2010-1158"},{"name":"CVE-2012-5526","url":"https://www.cve.org/CVERecord?id=CVE-2012-5526"},{"name":"CVE-2012-4188","url":"https://www.cve.org/CVERecord?id=CVE-2012-4188"},{"name":"CVE-2012-6139","url":"https://www.cve.org/CVERecord?id=CVE-2012-6139"},{"name":"CVE-2012-3992","url":"https://www.cve.org/CVERecord?id=CVE-2012-3992"},{"name":"CVE-2012-4193","url":"https://www.cve.org/CVERecord?id=CVE-2012-4193"},{"name":"CVE-2012-4185","url":"https://www.cve.org/CVERecord?id=CVE-2012-4185"},{"name":"CVE-2012-3995","url":"https://www.cve.org/CVERecord?id=CVE-2012-3995"},{"name":"CVE-2012-4195","url":"https://www.cve.org/CVERecord?id=CVE-2012-4195"},{"name":"CVE-2005-0448","url":"https://www.cve.org/CVERecord?id=CVE-2005-0448"},{"name":"CVE-2012-4194","url":"https://www.cve.org/CVERecord?id=CVE-2012-4194"},{"name":"CVE-2012-4192","url":"https://www.cve.org/CVERecord?id=CVE-2012-4192"},{"name":"CVE-2012-5195","url":"https://www.cve.org/CVERecord?id=CVE-2012-5195"},{"name":"CVE-2012-3994","url":"https://www.cve.org/CVERecord?id=CVE-2012-3994"},{"name":"CVE-2012-4187","url":"https://www.cve.org/CVERecord?id=CVE-2012-4187"},{"name":"CVE-2004-0452","url":"https://www.cve.org/CVERecord?id=CVE-2004-0452"},{"name":"CVE-2012-4196","url":"https://www.cve.org/CVERecord?id=CVE-2012-4196"},{"name":"CVE-2012-5667","url":"https://www.cve.org/CVERecord?id=CVE-2012-5667"},{"name":"CVE-2012-3982","url":"https://www.cve.org/CVERecord?id=CVE-2012-3982"},{"name":"CVE-2012-4182","url":"https://www.cve.org/CVERecord?id=CVE-2012-4182"},{"name":"CVE-2012-4186","url":"https://www.cve.org/CVERecord?id=CVE-2012-4186"},{"name":"CVE-2013-4124","url":"https://www.cve.org/CVERecord?id=CVE-2013-4124"},{"name":"CVE-2012-3499","url":"https://www.cve.org/CVERecord?id=CVE-2012-3499"},{"name":"CVE-2005-0156","url":"https://www.cve.org/CVERecord?id=CVE-2005-0156"},{"name":"CVE-2012-3988","url":"https://www.cve.org/CVERecord?id=CVE-2012-3988"},{"name":"CVE-2013-1862","url":"https://www.cve.org/CVERecord?id=CVE-2013-1862"},{"name":"CVE-2012-3986","url":"https://www.cve.org/CVERecord?id=CVE-2012-3986"},{"name":"CVE-2012-3993","url":"https://www.cve.org/CVERecord?id=CVE-2012-3993"},{"name":"CVE-2012-3991","url":"https://www.cve.org/CVERecord?id=CVE-2012-3991"},{"name":"CVE-2013-4238","url":"https://www.cve.org/CVERecord?id=CVE-2013-4238"},{"name":"CVE-2013-1896","url":"https://www.cve.org/CVERecord?id=CVE-2013-1896"},{"name":"CVE-2005-4278","url":"https://www.cve.org/CVERecord?id=CVE-2005-4278"},{"name":"CVE-2012-3983","url":"https://www.cve.org/CVERecord?id=CVE-2012-3983"},{"name":"CVE-2012-4180","url":"https://www.cve.org/CVERecord?id=CVE-2012-4180"},{"name":"CVE-2012-3990","url":"https://www.cve.org/CVERecord?id=CVE-2012-3990"}],"links":[],"reference":"CERTA-2013-AVI-590","revisions":[{"description":"version initiale.","revision_date":"2013-10-16T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Oracle Solaris</span>. Certaines d'entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle du 15 octobre 2013","url":"http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"}]}
