{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Safari versions ant\u00e9rieures \u00e0 11","product":{"name":"Safari","vendor":{"name":"Apple","scada":false}}},{"description":"iOS versions ant\u00e9rieures \u00e0 11","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Xcode versions ant\u00e9rieures \u00e0 9","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2017-7097","url":"https://www.cve.org/CVERecord?id=CVE-2017-7097"},{"name":"CVE-2017-7137","url":"https://www.cve.org/CVERecord?id=CVE-2017-7137"},{"name":"CVE-2017-7136","url":"https://www.cve.org/CVERecord?id=CVE-2017-7136"},{"name":"CVE-2017-7118","url":"https://www.cve.org/CVERecord?id=CVE-2017-7118"},{"name":"CVE-2017-1000117","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000117"},{"name":"CVE-2017-7085","url":"https://www.cve.org/CVERecord?id=CVE-2017-7085"},{"name":"CVE-2017-7133","url":"https://www.cve.org/CVERecord?id=CVE-2017-7133"},{"name":"CVE-2017-7135","url":"https://www.cve.org/CVERecord?id=CVE-2017-7135"},{"name":"CVE-2017-7072","url":"https://www.cve.org/CVERecord?id=CVE-2017-7072"},{"name":"CVE-2017-7089","url":"https://www.cve.org/CVERecord?id=CVE-2017-7089"},{"name":"CVE-2017-7106","url":"https://www.cve.org/CVERecord?id=CVE-2017-7106"},{"name":"CVE-2017-7076","url":"https://www.cve.org/CVERecord?id=CVE-2017-7076"},{"name":"CVE-2017-7088","url":"https://www.cve.org/CVERecord?id=CVE-2017-7088"},{"name":"CVE-2017-7134","url":"https://www.cve.org/CVERecord?id=CVE-2017-7134"},{"name":"CVE-2017-9800","url":"https://www.cve.org/CVERecord?id=CVE-2017-9800"}],"links":[],"reference":"CERTFR-2017-AVI-308","revisions":[{"description":"version initiale.","revision_date":"2017-09-20T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Injection de code indirecte \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Apple</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT208116 du 19 septembre 2017","url":"https://support.apple.com/en-us/HT208116"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT208103 du 19 septembre 2017","url":"https://support.apple.com/en-us/HT208103"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT208112 du 19 septembre 2017","url":"https://support.apple.com/en-us/HT208112"}]}
