{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"les versions de Sudo fournies par les \u00e9diteurs de distribution Linux sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"Sudo","vendor":{"name":"Sudo","scada":false}}},{"description":"Sudo versions ant\u00e9rieures \u00e0 1.9.5p2","product":{"name":"Sudo","vendor":{"name":"Sudo","scada":false}}}],"affected_systems_content":"","content":"## Solution\n\n**Il est recommand\u00e9 d'utiliser la mise \u00e0 jour de s\u00e9curit\u00e9 fournie par\nles \u00e9diteurs des distributions Linux.**\n","cves":[{"name":"CVE-2021-3156","url":"https://www.cve.org/CVERecord?id=CVE-2021-3156"}],"links":[],"reference":"CERTFR-2021-AVI-063","revisions":[{"description":"Version initiale","revision_date":"2021-01-27T00:00:00.000000"}],"risks":[{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Sudo. Elle permet \u00e0 un attaquant\nde provoquer une \u00e9l\u00e9vation de privil\u00e8ges. Les diff\u00e9rents \u00e9diteurs de\ndistributions Linux ont d\u00e9j\u00e0 publi\u00e9 des correctifs.\n","title":"Vuln\u00e9rabilit\u00e9 dans Sudo","vendor_advisories":[{"published_at":"2021-01-26","title":"Bulletin de s\u00e9curit\u00e9 Sudo","url":"https://www.sudo.ws/alerts/unescape_overflow.html"}]}
