{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Juniper QFX3500, QFX3600, QFX5100, QFX5200, EX4300 et EX4600 ex\u00e9cutant Junos OS avec des versions ant\u00e9rieures \u00e0 4.1X53-D40, 15.1X53-D40, 15.1R2","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos Space versions ant\u00e9rieures \u00e0 16.1R1","product":{"name":"Junos Space","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Tout produit Juniper avec RIP activ\u00e9 et ex\u00e9cutant Junos OS avec des versions ant\u00e9rieures \u00e0 12.1X46-D50, 12.1X47-D40, 12.3R13, 12.3X48-D30, 13.2X51-D40, 13.3R10, 14.1R8, 14.1X53-D35, 14.1X55-D35, 14.2R5, 15.1F6, 15.1R3, 15.1X49-D30, 15.1X49-D40, 15.1X53-D35, 16.1R1","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Tout produit Juniper ex\u00e9cutant Junos OS avec des versions ant\u00e9rieures \u00e0 12.1X46-D55, 12.1X47-D45, 12.3R13, 12.3X48-D35, 13.3R10, 14.1R8, 14.1X53-D40, 14.1X55-D35, 14.2R6, 15.1R1, 15.1X49-D20","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Tout produit Juniper avec DHCPv6 activ\u00e9 et ex\u00e9cutant Junos OS avec des versions ant\u00e9rieures \u00e0 11.4R13-S3, 12.1X46-D60, 12.3R12-S2, 12.3R13, 12.3X48-D40, 13.2X51-D40, 13.3R10, 14.1R8, 14.1X53-D12, 14.1X53-D35, 14.1X55-D35, 14.2R7, 15.1F6, 15.1R3, 15.1X49-D60, 15.1X53-D30, 16.1R1","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Juniper SRX Series Services Gateway chassis cluster avec PIM activ\u00e9 ex\u00e9cutant Junos OS avec des versions ant\u00e9rieures \u00e0 12.1X46-D65, 12.3X48-D40, 15.1X49-D60","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Juniper NSM3000, NSM4000 et NSMExpress sans le correctif de s\u00e9curit\u00e9 NSM Appliance Upgrade Package v3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2017-2310","url":"https://www.cve.org/CVERecord?id=CVE-2017-2310"},{"name":"CVE-2016-1838","url":"https://www.cve.org/CVERecord?id=CVE-2016-1838"},{"name":"CVE-2015-5600","url":"https://www.cve.org/CVERecord?id=CVE-2015-5600"},{"name":"CVE-2017-2304","url":"https://www.cve.org/CVERecord?id=CVE-2017-2304"},{"name":"CVE-2016-6662","url":"https://www.cve.org/CVERecord?id=CVE-2016-6662"},{"name":"CVE-2015-6563","url":"https://www.cve.org/CVERecord?id=CVE-2015-6563"},{"name":"CVE-2015-6564","url":"https://www.cve.org/CVERecord?id=CVE-2015-6564"},{"name":"CVE-2016-0777","url":"https://www.cve.org/CVERecord?id=CVE-2016-0777"},{"name":"CVE-2016-4447","url":"https://www.cve.org/CVERecord?id=CVE-2016-4447"},{"name":"CVE-2017-2308","url":"https://www.cve.org/CVERecord?id=CVE-2017-2308"},{"name":"CVE-2016-4448","url":"https://www.cve.org/CVERecord?id=CVE-2016-4448"},{"name":"CVE-2017-2303","url":"https://www.cve.org/CVERecord?id=CVE-2017-2303"},{"name":"CVE-2016-3705","url":"https://www.cve.org/CVERecord?id=CVE-2016-3705"},{"name":"CVE-2016-1907","url":"https://www.cve.org/CVERecord?id=CVE-2016-1907"},{"name":"CVE-2015-6565","url":"https://www.cve.org/CVERecord?id=CVE-2015-6565"},{"name":"CVE-2016-1834","url":"https://www.cve.org/CVERecord?id=CVE-2016-1834"},{"name":"CVE-2017-2300","url":"https://www.cve.org/CVERecord?id=CVE-2017-2300"},{"name":"CVE-2016-3115","url":"https://www.cve.org/CVERecord?id=CVE-2016-3115"},{"name":"CVE-2017-2307","url":"https://www.cve.org/CVERecord?id=CVE-2017-2307"},{"name":"CVE-2016-1835","url":"https://www.cve.org/CVERecord?id=CVE-2016-1835"},{"name":"CVE-2015-8104","url":"https://www.cve.org/CVERecord?id=CVE-2015-8104"},{"name":"CVE-2016-6515","url":"https://www.cve.org/CVERecord?id=CVE-2016-6515"},{"name":"CVE-2016-1836","url":"https://www.cve.org/CVERecord?id=CVE-2016-1836"},{"name":"CVE-2016-5387","url":"https://www.cve.org/CVERecord?id=CVE-2016-5387"},{"name":"CVE-2015-5366","url":"https://www.cve.org/CVERecord?id=CVE-2015-5366"},{"name":"CVE-2016-1833","url":"https://www.cve.org/CVERecord?id=CVE-2016-1833"},{"name":"CVE-2016-3627","url":"https://www.cve.org/CVERecord?id=CVE-2016-3627"},{"name":"CVE-2015-5364","url":"https://www.cve.org/CVERecord?id=CVE-2015-5364"},{"name":"CVE-2016-1840","url":"https://www.cve.org/CVERecord?id=CVE-2016-1840"},{"name":"CVE-2015-5352","url":"https://www.cve.org/CVERecord?id=CVE-2015-5352"},{"name":"CVE-2016-1762","url":"https://www.cve.org/CVERecord?id=CVE-2016-1762"},{"name":"CVE-2016-1837","url":"https://www.cve.org/CVERecord?id=CVE-2016-1837"},{"name":"CVE-2016-5573","url":"https://www.cve.org/CVERecord?id=CVE-2016-5573"},{"name":"CVE-2015-8325","url":"https://www.cve.org/CVERecord?id=CVE-2015-8325"},{"name":"CVE-2016-1839","url":"https://www.cve.org/CVERecord?id=CVE-2016-1839"},{"name":"CVE-2016-5195","url":"https://www.cve.org/CVERecord?id=CVE-2016-5195"},{"name":"CVE-2017-2302","url":"https://www.cve.org/CVERecord?id=CVE-2017-2302"},{"name":"CVE-2017-2306","url":"https://www.cve.org/CVERecord?id=CVE-2017-2306"},{"name":"CVE-2015-5307","url":"https://www.cve.org/CVERecord?id=CVE-2015-5307"},{"name":"CVE-2016-4449","url":"https://www.cve.org/CVERecord?id=CVE-2016-4449"},{"name":"CVE-2017-2305","url":"https://www.cve.org/CVERecord?id=CVE-2017-2305"},{"name":"CVE-2017-2311","url":"https://www.cve.org/CVERecord?id=CVE-2017-2311"},{"name":"CVE-2017-2309","url":"https://www.cve.org/CVERecord?id=CVE-2017-2309"},{"name":"CVE-2016-0778","url":"https://www.cve.org/CVERecord?id=CVE-2016-0778"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10770 du 11    janvier 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770&cat=SIRT_1&actp=LIST"},{"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10772 du 11    janvier 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10772&cat=SIRT_1&actp=LIST"},{"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10773 du 11    janvier 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10773&cat=SIRT_1&actp=LIST"},{"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10774 du 11    janvier 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774&cat=SIRT_1&actp=LIST"},{"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10771 du 11    janvier 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10771&cat=SIRT_1&actp=LIST"},{"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10769 du 11    janvier 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10769&cat=SIRT_1&actp=LIST"},{"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10768 du 11    janvier 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10768&cat=SIRT_1&actp=LIST"}],"reference":"CERTFR-2017-AVI-012","revisions":[{"description":"version initiale.","revision_date":"2017-01-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Injection de code indirecte \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Juniper</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l'\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10771 du 11 janvier 2017","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10774 du 11 janvier 2017","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10769 du 11 janvier 2017","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10773 du 11 janvier 2017","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10772 du 11 janvier 2017","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10770 du 11 janvier 2017","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 les produits Juniper JSA10768 du 11 janvier 2017","url":null}]}
