{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Cisco Network Registar (CNR) 7.x.","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco IOS R12.x ;","product":{"name":"IOS","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco IOS 12.x ;","product":{"name":"IOS","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco Application and Content Networking System (ACNS) ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco CNS Network Registar 6.x ;","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 affecte l'attribution al\u00e9atoire des identifiants de\ntransaction et des ports source des serveurs DNS des produits Cisco.\nCette vuln\u00e9rabilit\u00e9 permet \u00e0 une personne malveillante de contourner la\npolitique de s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2008-1447","url":"https://www.cve.org/CVERecord?id=CVE-2008-1447"}],"links":[],"reference":"CERTA-2008-AVI-358","revisions":[{"description":"version initiale.","revision_date":"2008-07-09T00:00:00.000000"}],"risks":[{"description":"Contournement de la politique de s\u00e9curit\u00e9"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans les produits <span class=\"textit\">Cisco</span>\npermet \u00e0 une personne malintentionn\u00e9e de contourner la politique de\ns\u00e9curit\u00e9.\n","title":"Vuln\u00e9rabilit\u00e9 dans les produits Cisco","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco 20080708-dns du 08 juillet 2008","url":"http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml"}]}
