{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Apple TV versions ant\u00e9rieures \u00e0 6.1","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Apple iOS versions ant\u00e9rieures \u00e0 7.1","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2014-1252","url":"https://www.cve.org/CVERecord?id=CVE-2014-1252"},{"name":"CVE-2013-5197","url":"https://www.cve.org/CVERecord?id=CVE-2013-5197"},{"name":"CVE-2013-2909","url":"https://www.cve.org/CVERecord?id=CVE-2013-2909"},{"name":"CVE-2013-5133","url":"https://www.cve.org/CVERecord?id=CVE-2013-5133"},{"name":"CVE-2013-5198","url":"https://www.cve.org/CVERecord?id=CVE-2013-5198"},{"name":"CVE-2014-1271","url":"https://www.cve.org/CVERecord?id=CVE-2014-1271"},{"name":"CVE-2012-2088","url":"https://www.cve.org/CVERecord?id=CVE-2012-2088"},{"name":"CVE-2013-6625","url":"https://www.cve.org/CVERecord?id=CVE-2013-6625"},{"name":"CVE-2014-1293","url":"https://www.cve.org/CVERecord?id=CVE-2014-1293"},{"name":"CVE-2014-1273","url":"https://www.cve.org/CVERecord?id=CVE-2014-1273"},{"name":"CVE-2013-6835","url":"https://www.cve.org/CVERecord?id=CVE-2013-6835"},{"name":"CVE-2014-1290","url":"https://www.cve.org/CVERecord?id=CVE-2014-1290"},{"name":"CVE-2014-1277","url":"https://www.cve.org/CVERecord?id=CVE-2014-1277"},{"name":"CVE-2014-1287","url":"https://www.cve.org/CVERecord?id=CVE-2014-1287"},{"name":"CVE-2014-1280","url":"https://www.cve.org/CVERecord?id=CVE-2014-1280"},{"name":"CVE-2013-5225","url":"https://www.cve.org/CVERecord?id=CVE-2013-5225"},{"name":"CVE-2014-1282","url":"https://www.cve.org/CVERecord?id=CVE-2014-1282"},{"name":"CVE-2014-1279","url":"https://www.cve.org/CVERecord?id=CVE-2014-1279"},{"name":"CVE-2013-2928","url":"https://www.cve.org/CVERecord?id=CVE-2013-2928"},{"name":"CVE-2013-5228","url":"https://www.cve.org/CVERecord?id=CVE-2013-5228"},{"name":"CVE-2014-1278","url":"https://www.cve.org/CVERecord?id=CVE-2014-1278"},{"name":"CVE-2013-6629","url":"https://www.cve.org/CVERecord?id=CVE-2013-6629"},{"name":"CVE-2014-1267","url":"https://www.cve.org/CVERecord?id=CVE-2014-1267"},{"name":"CVE-2014-1269","url":"https://www.cve.org/CVERecord?id=CVE-2014-1269"},{"name":"CVE-2013-2926","url":"https://www.cve.org/CVERecord?id=CVE-2013-2926"},{"name":"CVE-2014-1281","url":"https://www.cve.org/CVERecord?id=CVE-2014-1281"},{"name":"CVE-2014-1276","url":"https://www.cve.org/CVERecord?id=CVE-2014-1276"},{"name":"CVE-2013-5199","url":"https://www.cve.org/CVERecord?id=CVE-2013-5199"},{"name":"CVE-2013-5196","url":"https://www.cve.org/CVERecord?id=CVE-2013-5196"},{"name":"CVE-2014-1275","url":"https://www.cve.org/CVERecord?id=CVE-2014-1275"},{"name":"CVE-2014-1274","url":"https://www.cve.org/CVERecord?id=CVE-2014-1274"},{"name":"CVE-2013-5227","url":"https://www.cve.org/CVERecord?id=CVE-2013-5227"},{"name":"CVE-2014-1294","url":"https://www.cve.org/CVERecord?id=CVE-2014-1294"},{"name":"CVE-2014-1289","url":"https://www.cve.org/CVERecord?id=CVE-2014-1289"},{"name":"CVE-2014-1285","url":"https://www.cve.org/CVERecord?id=CVE-2014-1285"},{"name":"CVE-2014-1291","url":"https://www.cve.org/CVERecord?id=CVE-2014-1291"},{"name":"CVE-2014-1284","url":"https://www.cve.org/CVERecord?id=CVE-2014-1284"},{"name":"CVE-2014-1270","url":"https://www.cve.org/CVERecord?id=CVE-2014-1270"},{"name":"CVE-2014-1272","url":"https://www.cve.org/CVERecord?id=CVE-2014-1272"},{"name":"CVE-2014-1286","url":"https://www.cve.org/CVERecord?id=CVE-2014-1286"},{"name":"CVE-2013-6635","url":"https://www.cve.org/CVERecord?id=CVE-2013-6635"},{"name":"CVE-2014-1292","url":"https://www.cve.org/CVERecord?id=CVE-2014-1292"}],"links":[],"reference":"CERTFR-2014-AVI-116","revisions":[{"description":"version initiale.","revision_date":"2014-03-11T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"D\u00e9ni de service"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits <span\nclass=\"textit\">Apple</span>. Certaines d'entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\nd\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT6162 du 11 mars 2014","url":"http://support.apple.com/kb/HT6162"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT6163 du 11 mars 2014","url":"http://support.apple.com/kb/HT6163"}]}
