{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Juniper EX Series avec IPv6","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Junos OS versions 15.1 et post\u00e9rieures avec BGP","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"NorthStar Controller Application ant\u00e9rieures \u00e0 la version 2.1.0 SP1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Juniper SRX, vSRX et J-Series avec le serveur DNS Proxy actif","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-9310","url":"https://www.cve.org/CVERecord?id=CVE-2016-9310"},{"name":"CVE-2017-2322","url":"https://www.cve.org/CVERecord?id=CVE-2017-2322"},{"name":"CVE-2015-7973","url":"https://www.cve.org/CVERecord?id=CVE-2015-7973"},{"name":"CVE-2017-2316","url":"https://www.cve.org/CVERecord?id=CVE-2017-2316"},{"name":"CVE-2017-2328","url":"https://www.cve.org/CVERecord?id=CVE-2017-2328"},{"name":"CVE-2016-9131","url":"https://www.cve.org/CVERecord?id=CVE-2016-9131"},{"name":"CVE-2015-1349","url":"https://www.cve.org/CVERecord?id=CVE-2015-1349"},{"name":"CVE-2017-2333","url":"https://www.cve.org/CVERecord?id=CVE-2017-2333"},{"name":"CVE-2015-5477","url":"https://www.cve.org/CVERecord?id=CVE-2015-5477"},{"name":"CVE-2015-8158","url":"https://www.cve.org/CVERecord?id=CVE-2015-8158"},{"name":"CVE-2015-2808","url":"https://www.cve.org/CVERecord?id=CVE-2015-2808"},{"name":"CVE-2015-3456","url":"https://www.cve.org/CVERecord?id=CVE-2015-3456"},{"name":"CVE-2016-7429","url":"https://www.cve.org/CVERecord?id=CVE-2016-7429"},{"name":"CVE-2017-2319","url":"https://www.cve.org/CVERecord?id=CVE-2017-2319"},{"name":"CVE-2013-4450","url":"https://www.cve.org/CVERecord?id=CVE-2013-4450"},{"name":"CVE-2016-1886","url":"https://www.cve.org/CVERecord?id=CVE-2016-1886"},{"name":"CVE-2016-9311","url":"https://www.cve.org/CVERecord?id=CVE-2016-9311"},{"name":"CVE-2015-8138","url":"https://www.cve.org/CVERecord?id=CVE-2015-8138"},{"name":"CVE-2017-2334","url":"https://www.cve.org/CVERecord?id=CVE-2017-2334"},{"name":"CVE-2017-2332","url":"https://www.cve.org/CVERecord?id=CVE-2017-2332"},{"name":"CVE-2017-2340","url":"https://www.cve.org/CVERecord?id=CVE-2017-2340"},{"name":"CVE-2017-2325","url":"https://www.cve.org/CVERecord?id=CVE-2017-2325"},{"name":"CVE-2015-4620","url":"https://www.cve.org/CVERecord?id=CVE-2015-4620"},{"name":"CVE-2017-2329","url":"https://www.cve.org/CVERecord?id=CVE-2017-2329"},{"name":"CVE-2017-2318","url":"https://www.cve.org/CVERecord?id=CVE-2017-2318"},{"name":"CVE-2017-2320","url":"https://www.cve.org/CVERecord?id=CVE-2017-2320"},{"name":"CVE-2015-8104","url":"https://www.cve.org/CVERecord?id=CVE-2015-8104"},{"name":"CVE-2016-7427","url":"https://www.cve.org/CVERecord?id=CVE-2016-7427"},{"name":"CVE-2017-2330","url":"https://www.cve.org/CVERecord?id=CVE-2017-2330"},{"name":"CVE-2017-2324","url":"https://www.cve.org/CVERecord?id=CVE-2017-2324"},{"name":"CVE-2017-2317","url":"https://www.cve.org/CVERecord?id=CVE-2017-2317"},{"name":"CVE-2016-1014","url":"https://www.cve.org/CVERecord?id=CVE-2016-1014"},{"name":"CVE-2016-2776","url":"https://www.cve.org/CVERecord?id=CVE-2016-2776"},{"name":"CVE-2015-7979","url":"https://www.cve.org/CVERecord?id=CVE-2015-7979"},{"name":"CVE-2015-3209","url":"https://www.cve.org/CVERecord?id=CVE-2015-3209"},{"name":"CVE-2017-2331","url":"https://www.cve.org/CVERecord?id=CVE-2017-2331"},{"name":"CVE-2017-2326","url":"https://www.cve.org/CVERecord?id=CVE-2017-2326"},{"name":"CVE-2017-2315","url":"https://www.cve.org/CVERecord?id=CVE-2017-2315"},{"name":"CVE-2016-7431","url":"https://www.cve.org/CVERecord?id=CVE-2016-7431"},{"name":"CVE-2017-2313","url":"https://www.cve.org/CVERecord?id=CVE-2017-2313"},{"name":"CVE-2017-2323","url":"https://www.cve.org/CVERecord?id=CVE-2017-2323"},{"name":"CVE-2016-9147","url":"https://www.cve.org/CVERecord?id=CVE-2016-9147"},{"name":"CVE-2017-2327","url":"https://www.cve.org/CVERecord?id=CVE-2017-2327"},{"name":"CVE-2015-5307","url":"https://www.cve.org/CVERecord?id=CVE-2015-5307"},{"name":"CVE-2016-8864","url":"https://www.cve.org/CVERecord?id=CVE-2016-8864"},{"name":"CVE-2017-2321","url":"https://www.cve.org/CVERecord?id=CVE-2017-2321"},{"name":"CVE-2017-2312","url":"https://www.cve.org/CVERecord?id=CVE-2017-2312"},{"name":"CVE-2016-9444","url":"https://www.cve.org/CVERecord?id=CVE-2016-9444"}],"links":[],"reference":"CERTFR-2017-AVI-111","revisions":[{"description":"version initiale.","revision_date":"2017-04-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Ex\u00e9cution de code arbitraire"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Juniper</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0\ndistance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 JSA10776 Juniper du 12 avril 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10776&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 JSA10778 Juniper du 12 avril 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10778&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 JSA10781 Juniper du 12 avril 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10781&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 JSA10785 Juniper du 12 avril 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10785&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 JSA10780 Juniper du 12 avril 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10780&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 JSA10783 Juniper du 12 avril 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10783&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 JSA10786 Juniper du 12 avril 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10786&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 JSA10777 Juniper du 12 avril 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10777&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 JSA10784 Juniper du 12 avril 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10784&cat=SIRT_1&actp=LIST"}]}
