{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Sun Blade 6000 Ethernet Switched NEM 24P 10GE version 1.2","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Commutateurs de Passerelle Sun Network QDR InfiniBand versions ant\u00e9rieures \u00e0 2.2.2","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Commutateurs Oracle ES1-24 version 1.3","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Commutateurs Ethernet 40G 10G 72/64 version 2.0.0","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Serveurs Fujitsu M10-1, M10-4, M10-4S ex\u00e9cutant XCP versions ant\u00e9rieures \u00e0 XCP2320","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Commutateurs Sun Network 10GE 72p version 1.2","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Solaris versions 10 et 11.3","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Serveurs SPARC Enterprise M3000, M4000, M5000, M8000, M9000 ex\u00e9cutant XCP versions ant\u00e9rieures \u00e0 XCP1121","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Commutateurs Sun Data Center InfiniBand versions ant\u00e9rieures \u00e0 2.2.2","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Integrated Lights Out Manager (ILOM) versions 3.0, 3.1 et 3.2","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Solaris Cluster versions 3.4 et 4.3","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-3410","url":"https://www.cve.org/CVERecord?id=CVE-2012-3410"},{"name":"CVE-2016-3451","url":"https://www.cve.org/CVERecord?id=CVE-2016-3451"},{"name":"CVE-2016-5448","url":"https://www.cve.org/CVERecord?id=CVE-2016-5448"},{"name":"CVE-2015-5600","url":"https://www.cve.org/CVERecord?id=CVE-2015-5600"},{"name":"CVE-2014-3566","url":"https://www.cve.org/CVERecord?id=CVE-2014-3566"},{"name":"CVE-2016-5457","url":"https://www.cve.org/CVERecord?id=CVE-2016-5457"},{"name":"CVE-2015-1793","url":"https://www.cve.org/CVERecord?id=CVE-2015-1793"},{"name":"CVE-2015-3183","url":"https://www.cve.org/CVERecord?id=CVE-2015-3183"},{"name":"CVE-2016-3584","url":"https://www.cve.org/CVERecord?id=CVE-2016-3584"},{"name":"CVE-2016-5452","url":"https://www.cve.org/CVERecord?id=CVE-2016-5452"},{"name":"CVE-2016-0800","url":"https://www.cve.org/CVERecord?id=CVE-2016-0800"},{"name":"CVE-2016-3497","url":"https://www.cve.org/CVERecord?id=CVE-2016-3497"},{"name":"CVE-2016-5446","url":"https://www.cve.org/CVERecord?id=CVE-2016-5446"},{"name":"CVE-2015-2808","url":"https://www.cve.org/CVERecord?id=CVE-2015-2808"},{"name":"CVE-2016-5449","url":"https://www.cve.org/CVERecord?id=CVE-2016-5449"},{"name":"CVE-2013-2566","url":"https://www.cve.org/CVERecord?id=CVE-2013-2566"},{"name":"CVE-2016-3585","url":"https://www.cve.org/CVERecord?id=CVE-2016-3585"},{"name":"CVE-2015-8104","url":"https://www.cve.org/CVERecord?id=CVE-2015-8104"},{"name":"CVE-2015-3197","url":"https://www.cve.org/CVERecord?id=CVE-2015-3197"},{"name":"CVE-2016-3453","url":"https://www.cve.org/CVERecord?id=CVE-2016-3453"},{"name":"CVE-2016-5469","url":"https://www.cve.org/CVERecord?id=CVE-2016-5469"},{"name":"CVE-2016-3481","url":"https://www.cve.org/CVERecord?id=CVE-2016-3481"},{"name":"CVE-2016-5447","url":"https://www.cve.org/CVERecord?id=CVE-2016-5447"},{"name":"CVE-2016-5454","url":"https://www.cve.org/CVERecord?id=CVE-2016-5454"},{"name":"CVE-2016-5445","url":"https://www.cve.org/CVERecord?id=CVE-2016-5445"},{"name":"CVE-2016-5471","url":"https://www.cve.org/CVERecord?id=CVE-2016-5471"},{"name":"CVE-2016-5453","url":"https://www.cve.org/CVERecord?id=CVE-2016-5453"},{"name":"CVE-2015-0235","url":"https://www.cve.org/CVERecord?id=CVE-2015-0235"},{"name":"CVE-2016-3480","url":"https://www.cve.org/CVERecord?id=CVE-2016-3480"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujul2016verbose-2881721 du 19    juillet 2016","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016verbose-2881721.html#SUNS"},{"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujul2016-2881720 du 19    juillet 2016","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"}],"reference":"CERTFR-2016-AVI-244","revisions":[{"description":"version initiale.","revision_date":"2016-07-20T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Oracle Sun Systems Products Suite</span>. Certaines\nd'entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une atteinte\n\u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Oracle Sun Systems Products Suite","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujul2016-2881720 du 19 juillet 2016","url":null}]}
