{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"VPN Router s\u00e9rie 1000 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"VPN Router s\u00e9rie 4000 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Connectivity 4600 Secure IP Services Gateway ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Connectivity 1600 Secure IP Services Gateway ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Connectivity 4500 VPN Switch ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Connectivity 1500 VPN Switch ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Connectivity 4000 VPN Switch ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"VPN Router s\u00e9rie 2000 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Connectivity 1000 VPN Switch ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Connectivity 2000 VPN Switch ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"VPN Router s\u00e9rie 5000 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Connectivity 2500 VPN Switch ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"VPN Router s\u00e9rie 600 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"VPN Router Portfolio ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Connectivity 2600 Secure IP Services Gateway ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nCette vuln\u00e9rabilit\u00e9 permet \u00e0 une personne malveillante de r\u00e9aliser \u00e0\ndistance un d\u00e9ni de service en for\u00e7ant le red\u00e9marrage de l'\u00e9quipement\nvuln\u00e9rable, au moyen d'un paquet IKE malicieusement construit.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[],"links":[],"reference":"CERTA-2005-AVI-244","revisions":[{"description":"version initiale.","revision_date":"2005-07-06T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"}],"summary":"Une vuln\u00e9rabilit\u00e9 affectant de nombreux produits Nortel permet \u00e0 un\nutilisateur distant mal intentionn\u00e9 d'effectuer un d\u00e9ni de service.\n","title":"Vuln\u00e9rabilit\u00e9 dans les produits Nortel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Nortel #2005006047 du 05 juillet 2005","url":"http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=SECUREADVISORY"}]}
