{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"MySQL Enterprise Monitor versions 3.2.1.1049 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"MySQL Enterprise Monitor versions 3.3.0.1098 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"MySQL Enterprise Monitor versions 3.1.4.7895 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"MySQL Enterprise Monitor versions 3.1.3.7856 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"MySQL Server versions 5.5.53 et ant\u00e9rieures, 5.6.34 et ant\u00e9rieures, 5.7.16 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"MySQL Enterprise Monitor versions 3.1.5.7958 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"MySQL Enterprise Monitor versions 3.2.4.1102 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"MySQL Cluster versions 7.2.26 et ant\u00e9rieures, 7.3.14 et ant\u00e9rieures, 7.4.12 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-8318","url":"https://www.cve.org/CVERecord?id=CVE-2016-8318"},{"name":"CVE-2017-3273","url":"https://www.cve.org/CVERecord?id=CVE-2017-3273"},{"name":"CVE-2016-5590","url":"https://www.cve.org/CVERecord?id=CVE-2016-5590"},{"name":"CVE-2017-3323","url":"https://www.cve.org/CVERecord?id=CVE-2017-3323"},{"name":"CVE-2016-0635","url":"https://www.cve.org/CVERecord?id=CVE-2016-0635"},{"name":"CVE-2015-7501","url":"https://www.cve.org/CVERecord?id=CVE-2015-7501"},{"name":"CVE-2017-3257","url":"https://www.cve.org/CVERecord?id=CVE-2017-3257"},{"name":"CVE-2016-0714","url":"https://www.cve.org/CVERecord?id=CVE-2016-0714"},{"name":"CVE-2017-3256","url":"https://www.cve.org/CVERecord?id=CVE-2017-3256"},{"name":"CVE-2017-3244","url":"https://www.cve.org/CVERecord?id=CVE-2017-3244"},{"name":"CVE-2016-6304","url":"https://www.cve.org/CVERecord?id=CVE-2016-6304"},{"name":"CVE-2017-3291","url":"https://www.cve.org/CVERecord?id=CVE-2017-3291"},{"name":"CVE-2017-3258","url":"https://www.cve.org/CVERecord?id=CVE-2017-3258"},{"name":"CVE-2017-3238","url":"https://www.cve.org/CVERecord?id=CVE-2017-3238"},{"name":"CVE-2017-3312","url":"https://www.cve.org/CVERecord?id=CVE-2017-3312"},{"name":"CVE-2017-3251","url":"https://www.cve.org/CVERecord?id=CVE-2017-3251"},{"name":"CVE-2017-3322","url":"https://www.cve.org/CVERecord?id=CVE-2017-3322"},{"name":"CVE-2017-3320","url":"https://www.cve.org/CVERecord?id=CVE-2017-3320"},{"name":"CVE-2017-3321","url":"https://www.cve.org/CVERecord?id=CVE-2017-3321"},{"name":"CVE-2017-3243","url":"https://www.cve.org/CVERecord?id=CVE-2017-3243"},{"name":"CVE-2016-8327","url":"https://www.cve.org/CVERecord?id=CVE-2016-8327"},{"name":"CVE-2017-3317","url":"https://www.cve.org/CVERecord?id=CVE-2017-3317"},{"name":"CVE-2017-3319","url":"https://www.cve.org/CVERecord?id=CVE-2017-3319"},{"name":"CVE-2017-3265","url":"https://www.cve.org/CVERecord?id=CVE-2017-3265"},{"name":"CVE-2016-5541","url":"https://www.cve.org/CVERecord?id=CVE-2016-5541"},{"name":"CVE-2017-3318","url":"https://www.cve.org/CVERecord?id=CVE-2017-3318"},{"name":"CVE-2017-3313","url":"https://www.cve.org/CVERecord?id=CVE-2017-3313"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujan2017verbose-2881728 du 17    janvier 2017","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017verbose-2881728.html#MSQL"},{"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujan2017-2881727 du 17    janvier 2017","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL"}],"reference":"CERTFR-2017-AVI-018","revisions":[{"description":"version initiale.","revision_date":"2017-01-18T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Oracle MySQL</span>. Certaines d'entre elles permettent \u00e0\nun attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nun d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujan2017verbose-2881728 du 17 janvier 2017","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujan2017-2881727 du 17 janvier 2017","url":null}]}
