{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Sun Java JDK 1.6.x ;","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"Sun Java JDK 1.5.x ;","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"Sun Java JRE 1.3.x ;","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"Sun Java JRE 1.5.x / 5.x ;","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"Sun Java SDK 1.3.x ;","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"Sun Java JRE 1.4.x ;","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"Sun Java JRE 1.6.x / 6.x ;","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"Sun Java SDK 1.4.x.","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"Sun Java Enterprise System 5.x (JSSE) 1.x ;","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne premi\u00e8re vuln\u00e9rabilit\u00e9, li\u00e9e \u00e0 Java Web Start, permet \u00e0 un\nutilisateur d'\u00e9lever ses privil\u00e8ges et d'acc\u00e9der ind\u00fbment \u00e0 des fichiers\nen lecture et en modification (CVE-2007-2435).\n\nUne seconde vuln\u00e9rabilit\u00e9 permet \u00e0 une application (ou \u00e0 une applet)\nd'\u00e9lever ses privil\u00e8ges et d'ex\u00e9cuter un code arbitraire sur la machine\nvirtuelle (CVE-2007-3004).\n\nUne troisi\u00e8me vuln\u00e9rabilit\u00e9 permet de bloquer la machine virtuelle,\nprovoquant un d\u00e9ni de service (CVE-2007-3005).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2007-2788","url":"https://www.cve.org/CVERecord?id=CVE-2007-2788"},{"name":"CVE-2007-3004","url":"https://www.cve.org/CVERecord?id=CVE-2007-3004"},{"name":"CVE-2007-3922","url":"https://www.cve.org/CVERecord?id=CVE-2007-3922"},{"name":"CVE-2007-3503","url":"https://www.cve.org/CVERecord?id=CVE-2007-3503"},{"name":"CVE-2007-3655","url":"https://www.cve.org/CVERecord?id=CVE-2007-3655"},{"name":"CVE-2007-3005","url":"https://www.cve.org/CVERecord?id=CVE-2007-3005"},{"name":"CVE-2007-2789","url":"https://www.cve.org/CVERecord?id=CVE-2007-2789"},{"name":"CVE-2007-2435","url":"https://www.cve.org/CVERecord?id=CVE-2007-2435"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200705-23 du 31 mai 2007 :","url":"http://www.gentoo.org/security/en/glsa/glsa-200705-23.xml"},{"title":"Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200706-08 du 26 juin 2007    :","url":"http://www.gentoo.org/security/en/glsa/glsa-200706-08.xml"},{"title":"Bulletin de s\u00e9curit\u00e9 HP OpenView c01269450 du 14 novembre    2007 :","url":"http://www4.itrc.hp.com/service/cki/docDisplay.do?docId=c01269450"},{"title":"Avis du CERTA CERTA-2007-AVI-238 du 01 juin 2007 :","url":"http://www.certa.ssi.gouv.fr/site/CERTA-2007-AVI-238/index.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Avaya ASA-2007-199 du 23 mai 2007 :","url":"http://support.avaya.com/elmodocs2/security/ASA-2007-199.htm"},{"title":"Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2007:045 du 18 juillet    2008 :","url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00007.html"},{"title":"Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0829 du 07 ao\u00fbt 2007    :","url":"http://rhn.redhat.com/errata/RHSA-2007-0829.html"},{"title":"Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0818 du 06 ao\u00fbt 2007    :","url":"http://rhn.redhat.com/errata/RHSA-2007-0818.html"},{"title":"Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0817 du 06 ao\u00fbt 2007    :","url":"http://rhn.redhat.com/errata/RHSA-2007-0817.html"}],"reference":"CERTA-2007-AVI-348","revisions":[{"description":"version initiale.","revision_date":"2007-08-07T00:00:00.000000"},{"description":"modification des syst\u00e8mes affect\u00e9s, ajout des r\u00e9f\u00e9rences CVE et des bulletins de s\u00e9curit\u00e9 des \u00e9diteurs SuSE, Red Hat, Avaya et Gentoo.","revision_date":"2007-08-08T00:00:00.000000"},{"description":"ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 HP OpenView.","revision_date":"2007-11-16T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"Plusieurs vuln\u00e9rabilit\u00e9s dans les paquetages java-1.4.2-ibm permettent \u00e0\nun utilisateur malveillant de contourner la politique de s\u00e9curit\u00e9 du\nsyst\u00e8me vuln\u00e9rable.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans la machine Java d'IBM","vendor_advisories":[{"published_at":null,"title":"Avis Redhat RHSA-2007:0817-2 du 06 ao\u00fbt 2007","url":null}]}
