{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"tvOS versions ant\u00e9rieures \u00e0 10.1.1","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"iTunes pour Windows versions ant\u00e9rieures \u00e0 12.5.5","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"iCloud pour Windows versions ant\u00e9rieures \u00e0 6.1.1","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"macOS Sierra versions ant\u00e9rieures \u00e0 10.12.3","product":{"name":"macOS","vendor":{"name":"Apple","scada":false}}},{"description":"Safari versions ant\u00e9rieures \u00e0 10.0.3","product":{"name":"Safari","vendor":{"name":"Apple","scada":false}}},{"description":"iOS versions ant\u00e9rieures \u00e0 10.2.1","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"watchOS versions ant\u00e9rieures \u00e0 3.1.3","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-7615","url":"https://www.cve.org/CVERecord?id=CVE-2016-7615"},{"name":"CVE-2016-7643","url":"https://www.cve.org/CVERecord?id=CVE-2016-7643"},{"name":"CVE-2016-7589","url":"https://www.cve.org/CVERecord?id=CVE-2016-7589"},{"name":"CVE-2017-2358","url":"https://www.cve.org/CVERecord?id=CVE-2017-2358"},{"name":"CVE-2017-2369","url":"https://www.cve.org/CVERecord?id=CVE-2017-2369"},{"name":"CVE-2016-9933","url":"https://www.cve.org/CVERecord?id=CVE-2016-9933"},{"name":"CVE-2016-7591","url":"https://www.cve.org/CVERecord?id=CVE-2016-7591"},{"name":"CVE-2016-7637","url":"https://www.cve.org/CVERecord?id=CVE-2016-7637"},{"name":"CVE-2016-4688","url":"https://www.cve.org/CVERecord?id=CVE-2016-4688"},{"name":"CVE-2017-2371","url":"https://www.cve.org/CVERecord?id=CVE-2017-2371"},{"name":"CVE-2016-7616","url":"https://www.cve.org/CVERecord?id=CVE-2016-7616"},{"name":"CVE-2016-7659","url":"https://www.cve.org/CVERecord?id=CVE-2016-7659"},{"name":"CVE-2017-2353","url":"https://www.cve.org/CVERecord?id=CVE-2017-2353"},{"name":"CVE-2016-7663","url":"https://www.cve.org/CVERecord?id=CVE-2016-7663"},{"name":"CVE-2016-7626","url":"https://www.cve.org/CVERecord?id=CVE-2016-7626"},{"name":"CVE-2017-2365","url":"https://www.cve.org/CVERecord?id=CVE-2017-2365"},{"name":"CVE-2016-7595","url":"https://www.cve.org/CVERecord?id=CVE-2016-7595"},{"name":"CVE-2016-7657","url":"https://www.cve.org/CVERecord?id=CVE-2016-7657"},{"name":"CVE-2017-2357","url":"https://www.cve.org/CVERecord?id=CVE-2017-2357"},{"name":"CVE-2017-2370","url":"https://www.cve.org/CVERecord?id=CVE-2017-2370"},{"name":"CVE-2016-7588","url":"https://www.cve.org/CVERecord?id=CVE-2016-7588"},{"name":"CVE-2016-7636","url":"https://www.cve.org/CVERecord?id=CVE-2016-7636"},{"name":"CVE-2017-2356","url":"https://www.cve.org/CVERecord?id=CVE-2017-2356"},{"name":"CVE-2017-2352","url":"https://www.cve.org/CVERecord?id=CVE-2017-2352"},{"name":"CVE-2017-2360","url":"https://www.cve.org/CVERecord?id=CVE-2017-2360"},{"name":"CVE-2017-2363","url":"https://www.cve.org/CVERecord?id=CVE-2017-2363"},{"name":"CVE-2016-1248","url":"https://www.cve.org/CVERecord?id=CVE-2016-1248"},{"name":"CVE-2016-7651","url":"https://www.cve.org/CVERecord?id=CVE-2016-7651"},{"name":"CVE-2016-7621","url":"https://www.cve.org/CVERecord?id=CVE-2016-7621"},{"name":"CVE-2016-7606","url":"https://www.cve.org/CVERecord?id=CVE-2016-7606"},{"name":"CVE-2016-8687","url":"https://www.cve.org/CVERecord?id=CVE-2016-8687"},{"name":"CVE-2017-2361","url":"https://www.cve.org/CVERecord?id=CVE-2017-2361"},{"name":"CVE-2017-2366","url":"https://www.cve.org/CVERecord?id=CVE-2017-2366"},{"name":"CVE-2017-2373","url":"https://www.cve.org/CVERecord?id=CVE-2017-2373"},{"name":"CVE-2016-4691","url":"https://www.cve.org/CVERecord?id=CVE-2016-4691"},{"name":"CVE-2017-2351","url":"https://www.cve.org/CVERecord?id=CVE-2017-2351"},{"name":"CVE-2017-2362","url":"https://www.cve.org/CVERecord?id=CVE-2017-2362"},{"name":"CVE-2016-4693","url":"https://www.cve.org/CVERecord?id=CVE-2016-4693"},{"name":"CVE-2016-7658","url":"https://www.cve.org/CVERecord?id=CVE-2016-7658"},{"name":"CVE-2016-7662","url":"https://www.cve.org/CVERecord?id=CVE-2016-7662"},{"name":"CVE-2016-7660","url":"https://www.cve.org/CVERecord?id=CVE-2016-7660"},{"name":"CVE-2016-7612","url":"https://www.cve.org/CVERecord?id=CVE-2016-7612"},{"name":"CVE-2017-2350","url":"https://www.cve.org/CVERecord?id=CVE-2017-2350"},{"name":"CVE-2016-7644","url":"https://www.cve.org/CVERecord?id=CVE-2016-7644"},{"name":"CVE-2017-2364","url":"https://www.cve.org/CVERecord?id=CVE-2017-2364"},{"name":"CVE-2016-7627","url":"https://www.cve.org/CVERecord?id=CVE-2016-7627"},{"name":"CVE-2016-8670","url":"https://www.cve.org/CVERecord?id=CVE-2016-8670"},{"name":"CVE-2016-7607","url":"https://www.cve.org/CVERecord?id=CVE-2016-7607"},{"name":"CVE-2017-2354","url":"https://www.cve.org/CVERecord?id=CVE-2017-2354"},{"name":"CVE-2016-7594","url":"https://www.cve.org/CVERecord?id=CVE-2016-7594"},{"name":"CVE-2016-7619","url":"https://www.cve.org/CVERecord?id=CVE-2016-7619"},{"name":"CVE-2016-9934","url":"https://www.cve.org/CVERecord?id=CVE-2016-9934"},{"name":"CVE-2017-2368","url":"https://www.cve.org/CVERecord?id=CVE-2017-2368"},{"name":"CVE-2017-2355","url":"https://www.cve.org/CVERecord?id=CVE-2017-2355"},{"name":"CVE-2017-2359","url":"https://www.cve.org/CVERecord?id=CVE-2017-2359"}],"links":[],"reference":"CERTFR-2017-AVI-028","revisions":[{"description":"version initiale.","revision_date":"2017-01-24T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"D\u00e9ni de service"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Apple</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service et un contournement de la politique de\ns\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT207485 du 23 janvier 2017","url":"https://support.apple.com/en-us/HT207485"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT207482 du 23 janvier 2017","url":"https://support.apple.com/en-us/HT207482"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT207483 du 23 janvier 2017","url":"https://support.apple.com/en-us/HT207483"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT207481 du 23 janvier 2017","url":"https://support.apple.com/en-us/HT207481"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT207487 du 23 janvier 2017","url":"https://support.apple.com/en-us/HT207487"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT207484 du 23 janvier 2017","url":"https://support.apple.com/en-us/HT207484"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT207486 du 23 janvier 2017","url":"https://support.apple.com/en-us/HT207486"}]}
