{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"PacketShaper S-Series 11.2, 11.3, et 11.4","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"OPIC","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"SSLV 3.7 et 3.8 versions ant\u00e9rieures \u00e0 3.8.2-418 et 3.8.3-120","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"NSP 5.2 et 5.3","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"Android Mobile Agent 1.x","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"SA 6.6, 7.0, et 7.1","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"ProxyClient 3.4","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"PacketShaper 9.2","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"Client Connector","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"IntelligenceCenter 3.2 et 3.3","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"ProxyAV 3.4 et 3.5","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"SGOS 6.2 versions ant\u00e9rieures \u00e0 6.2.16.4, 6.5 versions ant\u00e9rieures \u00e0 6.5.7.5, et 6.6","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"Reporter (Virtualized Reporter) 9.4","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"NNP 5.2 et 5.3","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"CAS 1.1 versions ant\u00e9rieures \u00e0 1.1.5.6 et 1.2 versions ant\u00e9rieures 1.2.4.4","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"BCAAA 5.5 et 6.1","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"CacheFlow 2.x et 3.x","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"MAA 4.1 et 4.2","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"MAG2","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"ICSP 5.3","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"Director 6.1 versions ant\u00e9rieures 6.1.19.1","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"PolicyCenter 9.2","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"Management Center versions ant\u00e9rieures 1.3.3.2","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}},{"description":"Unified Agent 4.1","product":{"name":"N/A","vendor":{"name":"Bluecoat","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2015-0208","url":"https://www.cve.org/CVERecord?id=CVE-2015-0208"},{"name":"CVE-2015-0292","url":"https://www.cve.org/CVERecord?id=CVE-2015-0292"},{"name":"CVE-2015-0286","url":"https://www.cve.org/CVERecord?id=CVE-2015-0286"},{"name":"CVE-2015-0288","url":"https://www.cve.org/CVERecord?id=CVE-2015-0288"},{"name":"CVE-2015-0290","url":"https://www.cve.org/CVERecord?id=CVE-2015-0290"},{"name":"CVE-2015-0207","url":"https://www.cve.org/CVERecord?id=CVE-2015-0207"},{"name":"CVE-2015-0285","url":"https://www.cve.org/CVERecord?id=CVE-2015-0285"},{"name":"CVE-2015-0293","url":"https://www.cve.org/CVERecord?id=CVE-2015-0293"},{"name":"CVE-2015-0287","url":"https://www.cve.org/CVERecord?id=CVE-2015-0287"},{"name":"CVE-2015-1787","url":"https://www.cve.org/CVERecord?id=CVE-2015-1787"},{"name":"CVE-2015-0209","url":"https://www.cve.org/CVERecord?id=CVE-2015-0209"},{"name":"CVE-2015-0291","url":"https://www.cve.org/CVERecord?id=CVE-2015-0291"},{"name":"CVE-2015-0289","url":"https://www.cve.org/CVERecord?id=CVE-2015-0289"}],"links":[],"reference":"CERTFR-2015-AVI-259","revisions":[{"description":"version initiale.","revision_date":"2015-06-17T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits <span\nclass=\"textit\">BlueCoat</span>. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits BlueCoat","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 BlueCoat SA92 du 16 juin 2015","url":"https://bto.bluecoat.com/security-advisory/sa92"}]}
