{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Adobe Flash Player 11.2.202.468 et versions ant\u00e9rieures pour Linux","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Flash Player 18.0.0.194 et versions ant\u00e9rieures","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Flash Player Extended Support versions 13.0.0.296 et ant\u00e9rieures","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}}],"affected_systems_content":null,"closed_at":"2015-07-10","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[],"links":[{"title":"Analyse de Trend Micro","url":"http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/"}],"reference":"CERTFR-2015-ALE-005","revisions":[{"description":"version initiale.","revision_date":"2015-07-08T00:00:00.000000"},{"description":"fermeture de l'alerte suite \u00e0 la publication d'un correctif par l'\u00e9diteur.","revision_date":"2015-07-10T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Suite \u00e0 l'exfiltration des donn\u00e9es provenant de l'entreprise italienne\n\"Hacking Team\", une vuln\u00e9rabilit\u00e9 de type 0 day dans <span\nclass=\"textit\">Adobe Flash Player</span> a \u00e9t\u00e9 d\u00e9voil\u00e9e. Elle permet \u00e0\nun attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\nPlusieurs kits d'exploitation ont int\u00e9gr\u00e9 cette vuln\u00e9rabilit\u00e9 qui est\nactivement exploit\u00e9e.\n","title":"Vuln\u00e9rabilit\u00e9 dans Adobe Flash Player","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Adobe Flash Player du 08 juillet 2015","url":"https://helpx.adobe.com/security/products/flash-player/apsa15-03.html"}]}
