{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Xfree86 version 4.2.x ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Xfree86 version 4.5.x ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Xfree86 version 4.3.x ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Xfree86 version 4.4.x ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"X11 6.X.","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Xfree86 version 4.1.x ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Xfree86/X11/Xorg. Cette\nvuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e en local. L'exploitation permet\nl'ex\u00e9cution de code arbitraire qui peut conduire \u00e0 l'obtention de\nnouveaux privil\u00e8ges.\n\n## Solution\n\nMettre \u00e0 jour via les m\u00e9canismes mis \u00e0 disposition par l'\u00e9diteur du\nsyst\u00e8me d'exploitation.\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SA-2005:056 du 26 septembre    2005 :","url":"http://www.novell.com/linux/security/advisories/2005_56_xserver.html"},{"title":"Bulletins de s\u00e9curit\u00e9 FreeBSD pour XFree86-Server et    xorg-server du 15 septembre 2005 :","url":"http://www.vuxml.org/freebsd/pkg-XFree86-Server.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Debian DSA-816 du 19 septembre 2005 :","url":"http://www.debian.org/security/2005/dsa-816"},{"title":"Bulletins de s\u00e9curit\u00e9 FreeBSD pour XFree86-Server et    xorg-server du 15 septembre 2005 :","url":"http://www.vuxml.org/freebsd/pkg-xorg-server.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Sun #101926 du 15 septembre 2005 :","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101926-1"},{"title":"Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2005:164 du 13    septembre 2005 :","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:164"},{"title":"Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005-329 du 12 septembre    2005 :","url":"http://rhn.redhat.com/errata/RHSA-2005-329.html"},{"title":"Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005-396 du 13 septembre    2005 :","url":"http://rhn.redhat.com/errata/RHSA-2005-396.html"}],"reference":"CERTA-2005-AVI-345","revisions":[{"description":"version initiale.","revision_date":"2005-09-15T00:00:00.000000"},{"description":"ajout de la r\u00e9f\u00e9rence CVE CAN-2005-2495 et des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 FreeBSD, Sun, RedHat RHSA-2005-396 et Mandriva.","revision_date":"2005-09-19T00:00:00.000000"},{"description":"ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Debian DSA-816.","revision_date":"2005-09-22T00:00:00.000000"},{"description":"ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 SUSE SUSE-SA-2005:056.","revision_date":"2005-09-26T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire"},{"description":"Augmentation de privil\u00e8ges"}],"summary":null,"title":"Vuln\u00e9rabilit\u00e9 dans Xfree86/X11/Xorg","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Gentoo","url":"http://www.gentoo.org/security/en/glsa/glsa-200509-07.xml"}]}
