{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Apple tvOS versions ant\u00e9rieures \u00e0 9.2.2","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Apple iTunes pour Windows versions ant\u00e9rieures \u00e0 12.4.2","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Apple iCloud pour Windows versions ant\u00e9rieures \u00e0 5.2.1","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Apple Safari versions ant\u00e9rieures \u00e0 9.1.2","product":{"name":"Safari","vendor":{"name":"Apple","scada":false}}},{"description":"Apple watchOS versions ant\u00e9rieures \u00e0 2.2.2","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Apple OS X El Capitan versions ant\u00e9rieures \u00e0 10.11.6 et sans la mise \u00e0 jour de s\u00e9curit\u00e9 2016-004","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Apple iOS versions ant\u00e9rieures \u00e0 9.3.3","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-4650","url":"https://www.cve.org/CVERecord?id=CVE-2016-4650"},{"name":"CVE-2016-1865","url":"https://www.cve.org/CVERecord?id=CVE-2016-1865"},{"name":"CVE-2016-4584","url":"https://www.cve.org/CVERecord?id=CVE-2016-4584"},{"name":"CVE-2016-4645","url":"https://www.cve.org/CVERecord?id=CVE-2016-4645"},{"name":"CVE-2016-4609","url":"https://www.cve.org/CVERecord?id=CVE-2016-4609"},{"name":"CVE-2016-4648","url":"https://www.cve.org/CVERecord?id=CVE-2016-4648"},{"name":"CVE-2016-4629","url":"https://www.cve.org/CVERecord?id=CVE-2016-4629"},{"name":"CVE-2016-4601","url":"https://www.cve.org/CVERecord?id=CVE-2016-4601"},{"name":"CVE-2016-4600","url":"https://www.cve.org/CVERecord?id=CVE-2016-4600"},{"name":"CVE-2016-4646","url":"https://www.cve.org/CVERecord?id=CVE-2016-4646"},{"name":"CVE-2016-4623","url":"https://www.cve.org/CVERecord?id=CVE-2016-4623"},{"name":"CVE-2016-4582","url":"https://www.cve.org/CVERecord?id=CVE-2016-4582"},{"name":"CVE-2016-2105","url":"https://www.cve.org/CVERecord?id=CVE-2016-2105"},{"name":"CVE-2016-2176","url":"https://www.cve.org/CVERecord?id=CVE-2016-2176"},{"name":"CVE-2016-4595","url":"https://www.cve.org/CVERecord?id=CVE-2016-4595"},{"name":"CVE-2016-4447","url":"https://www.cve.org/CVERecord?id=CVE-2016-4447"},{"name":"CVE-2016-4448","url":"https://www.cve.org/CVERecord?id=CVE-2016-4448"},{"name":"CVE-2016-4614","url":"https://www.cve.org/CVERecord?id=CVE-2016-4614"},{"name":"CVE-2016-0718","url":"https://www.cve.org/CVERecord?id=CVE-2016-0718"},{"name":"CVE-2016-4589","url":"https://www.cve.org/CVERecord?id=CVE-2016-4589"},{"name":"CVE-2016-4627","url":"https://www.cve.org/CVERecord?id=CVE-2016-4627"},{"name":"CVE-2016-1863","url":"https://www.cve.org/CVERecord?id=CVE-2016-1863"},{"name":"CVE-2016-4631","url":"https://www.cve.org/CVERecord?id=CVE-2016-4631"},{"name":"CVE-2016-4615","url":"https://www.cve.org/CVERecord?id=CVE-2016-4615"},{"name":"CVE-2016-4632","url":"https://www.cve.org/CVERecord?id=CVE-2016-4632"},{"name":"CVE-2016-1684","url":"https://www.cve.org/CVERecord?id=CVE-2016-1684"},{"name":"CVE-2016-4598","url":"https://www.cve.org/CVERecord?id=CVE-2016-4598"},{"name":"CVE-2016-2107","url":"https://www.cve.org/CVERecord?id=CVE-2016-2107"},{"name":"CVE-2016-4649","url":"https://www.cve.org/CVERecord?id=CVE-2016-4649"},{"name":"CVE-2016-4621","url":"https://www.cve.org/CVERecord?id=CVE-2016-4621"},{"name":"CVE-2016-4592","url":"https://www.cve.org/CVERecord?id=CVE-2016-4592"},{"name":"CVE-2016-1836","url":"https://www.cve.org/CVERecord?id=CVE-2016-1836"},{"name":"CVE-2016-4624","url":"https://www.cve.org/CVERecord?id=CVE-2016-4624"},{"name":"CVE-2016-4634","url":"https://www.cve.org/CVERecord?id=CVE-2016-4634"},{"name":"CVE-2016-2106","url":"https://www.cve.org/CVERecord?id=CVE-2016-2106"},{"name":"CVE-2016-4619","url":"https://www.cve.org/CVERecord?id=CVE-2016-4619"},{"name":"CVE-2016-4596","url":"https://www.cve.org/CVERecord?id=CVE-2016-4596"},{"name":"CVE-2016-4588","url":"https://www.cve.org/CVERecord?id=CVE-2016-4588"},{"name":"CVE-2016-4610","url":"https://www.cve.org/CVERecord?id=CVE-2016-4610"},{"name":"CVE-2016-4637","url":"https://www.cve.org/CVERecord?id=CVE-2016-4637"},{"name":"CVE-2016-4597","url":"https://www.cve.org/CVERecord?id=CVE-2016-4597"},{"name":"CVE-2016-4599","url":"https://www.cve.org/CVERecord?id=CVE-2016-4599"},{"name":"CVE-2016-4633","url":"https://www.cve.org/CVERecord?id=CVE-2016-4633"},{"name":"CVE-2016-4612","url":"https://www.cve.org/CVERecord?id=CVE-2016-4612"},{"name":"CVE-2016-4605","url":"https://www.cve.org/CVERecord?id=CVE-2016-4605"},{"name":"CVE-2016-4587","url":"https://www.cve.org/CVERecord?id=CVE-2016-4587"},{"name":"CVE-2016-4602","url":"https://www.cve.org/CVERecord?id=CVE-2016-4602"},{"name":"CVE-2016-4652","url":"https://www.cve.org/CVERecord?id=CVE-2016-4652"},{"name":"CVE-2016-4586","url":"https://www.cve.org/CVERecord?id=CVE-2016-4586"},{"name":"CVE-2016-4607","url":"https://www.cve.org/CVERecord?id=CVE-2016-4607"},{"name":"CVE-2016-4594","url":"https://www.cve.org/CVERecord?id=CVE-2016-4594"},{"name":"CVE-2016-1864","url":"https://www.cve.org/CVERecord?id=CVE-2016-1864"},{"name":"CVE-2016-4641","url":"https://www.cve.org/CVERecord?id=CVE-2016-4641"},{"name":"CVE-2016-4647","url":"https://www.cve.org/CVERecord?id=CVE-2016-4647"},{"name":"CVE-2016-4583","url":"https://www.cve.org/CVERecord?id=CVE-2016-4583"},{"name":"CVE-2014-9862","url":"https://www.cve.org/CVERecord?id=CVE-2014-9862"},{"name":"CVE-2016-4625","url":"https://www.cve.org/CVERecord?id=CVE-2016-4625"},{"name":"CVE-2016-4616","url":"https://www.cve.org/CVERecord?id=CVE-2016-4616"},{"name":"CVE-2016-4590","url":"https://www.cve.org/CVERecord?id=CVE-2016-4590"},{"name":"CVE-2016-4640","url":"https://www.cve.org/CVERecord?id=CVE-2016-4640"},{"name":"CVE-2016-4603","url":"https://www.cve.org/CVERecord?id=CVE-2016-4603"},{"name":"CVE-2016-4585","url":"https://www.cve.org/CVERecord?id=CVE-2016-4585"},{"name":"CVE-2016-4593","url":"https://www.cve.org/CVERecord?id=CVE-2016-4593"},{"name":"CVE-2016-4635","url":"https://www.cve.org/CVERecord?id=CVE-2016-4635"},{"name":"CVE-2016-4608","url":"https://www.cve.org/CVERecord?id=CVE-2016-4608"},{"name":"CVE-2016-4638","url":"https://www.cve.org/CVERecord?id=CVE-2016-4638"},{"name":"CVE-2016-4639","url":"https://www.cve.org/CVERecord?id=CVE-2016-4639"},{"name":"CVE-2016-4591","url":"https://www.cve.org/CVERecord?id=CVE-2016-4591"},{"name":"CVE-2016-4630","url":"https://www.cve.org/CVERecord?id=CVE-2016-4630"},{"name":"CVE-2016-4604","url":"https://www.cve.org/CVERecord?id=CVE-2016-4604"},{"name":"CVE-2016-2109","url":"https://www.cve.org/CVERecord?id=CVE-2016-2109"},{"name":"CVE-2016-2108","url":"https://www.cve.org/CVERecord?id=CVE-2016-2108"},{"name":"CVE-2016-4449","url":"https://www.cve.org/CVERecord?id=CVE-2016-4449"},{"name":"CVE-2016-4622","url":"https://www.cve.org/CVERecord?id=CVE-2016-4622"},{"name":"CVE-2016-4628","url":"https://www.cve.org/CVERecord?id=CVE-2016-4628"},{"name":"CVE-2016-4626","url":"https://www.cve.org/CVERecord?id=CVE-2016-4626"},{"name":"CVE-2016-4651","url":"https://www.cve.org/CVERecord?id=CVE-2016-4651"},{"name":"CVE-2016-4483","url":"https://www.cve.org/CVERecord?id=CVE-2016-4483"}],"links":[],"reference":"CERTFR-2016-AVI-239","revisions":[{"description":"version initiale.","revision_date":"2016-07-19T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Injection de code indirecte \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Apple</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT206902 du 18 juillet 2016","url":"https://support.apple.com/en-us/HT206902"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT206905 du 18 juillet 2016","url":"https://support.apple.com/en-us/HT206905"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT206903 du 18 juillet 2016","url":"https://support.apple.com/en-us/HT206903"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT206901 du 18 juillet 2016","url":"https://support.apple.com/en-us/HT206901"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT206904 du 18 juillet 2016","url":"https://support.apple.com/en-us/HT206904"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT206899 du 18 juillet 2016","url":"https://support.apple.com/en-us/HT206899"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT206900 du 18 juillet 2016","url":"https://support.apple.com/en-us/HT206900"}]}
