{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Java SE Embedded version 8u111","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Java SE versions 6u131, 7u121 et 8u112","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"JRockit version R28.3.12","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2017-3259","url":"https://www.cve.org/CVERecord?id=CVE-2017-3259"},{"name":"CVE-2016-5549","url":"https://www.cve.org/CVERecord?id=CVE-2016-5549"},{"name":"CVE-2016-5547","url":"https://www.cve.org/CVERecord?id=CVE-2016-5547"},{"name":"CVE-2017-3289","url":"https://www.cve.org/CVERecord?id=CVE-2017-3289"},{"name":"CVE-2016-8328","url":"https://www.cve.org/CVERecord?id=CVE-2016-8328"},{"name":"CVE-2016-5552","url":"https://www.cve.org/CVERecord?id=CVE-2016-5552"},{"name":"CVE-2017-3272","url":"https://www.cve.org/CVERecord?id=CVE-2017-3272"},{"name":"CVE-2017-3261","url":"https://www.cve.org/CVERecord?id=CVE-2017-3261"},{"name":"CVE-2017-3260","url":"https://www.cve.org/CVERecord?id=CVE-2017-3260"},{"name":"CVE-2016-2183","url":"https://www.cve.org/CVERecord?id=CVE-2016-2183"},{"name":"CVE-2016-5548","url":"https://www.cve.org/CVERecord?id=CVE-2016-5548"},{"name":"CVE-2017-3253","url":"https://www.cve.org/CVERecord?id=CVE-2017-3253"},{"name":"CVE-2017-3241","url":"https://www.cve.org/CVERecord?id=CVE-2017-3241"},{"name":"CVE-2016-5546","url":"https://www.cve.org/CVERecord?id=CVE-2016-5546"},{"name":"CVE-2017-3231","url":"https://www.cve.org/CVERecord?id=CVE-2017-3231"},{"name":"CVE-2017-3262","url":"https://www.cve.org/CVERecord?id=CVE-2017-3262"},{"name":"CVE-2017-3252","url":"https://www.cve.org/CVERecord?id=CVE-2017-3252"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujan2017-2881727 du 17    janvier 2017","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA"},{"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujan2017verbose-2881728 du 17    janvier 2017","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017verbose-2881728.html#JAVA"}],"reference":"CERTFR-2017-AVI-017","revisions":[{"description":"version initiale.","revision_date":"2017-01-18T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Oracle Java SE</span>. Certaines d'entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nun d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java SE","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujan2017verbose-2881728 du 17 janvier 2017","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujan2017-2881727 du 17 janvier 2017","url":null}]}
