{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Microsoft Internet Explorer 5.01 Service Pack 4 ;","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Internet Explorer 8.","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Internet Explorer 7 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Internet Explorer 6 Service Pack 1 ;","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Internet Explorer 6 ;","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nMicrosoft a corrig\u00e9 trois vuln\u00e9rabilit\u00e9s de type corruption de m\u00e9moire\ndans son navigateur Internet Explorer. Ces failles permettent \u00e0 une\npersonne malintentionn\u00e9e d'ex\u00e9cuter du code arbitraire en incitant une\nvictime \u00e0 visiter une page web sp\u00e9cialement con\u00e7ue.\n\nDe plus, cette mise \u00e0 jour contient deux m\u00e9canismes de protection contre\ndes contr\u00f4les ActiveX qui seraient vuln\u00e9rables \u00e0 la faille d\u00e9taill\u00e9e\ndans l'avis CERTA-2009-AVI-300.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2009-1918","url":"https://www.cve.org/CVERecord?id=CVE-2009-1918"},{"name":"CVE-2009-1917","url":"https://www.cve.org/CVERecord?id=CVE-2009-1917"},{"name":"CVE-2009-1919","url":"https://www.cve.org/CVERecord?id=CVE-2009-1919"}],"links":[{"title":"Avis CERTA-2009-AVI-300 du 29 juillet 2009 :","url":"http://www.certa.ssi.gouv.fr/site/CERTA-2009-AVI-300/index.html"}],"reference":"CERTA-2009-AVI-299","revisions":[{"description":"version initiale.","revision_date":"2009-07-29T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s permettant l'ex\u00e9cution de code arbitraire \u00e0\ndistance ont \u00e9t\u00e9 corrig\u00e9es dans <span class=\"textit\">Microsoft Internet\nExplorer</span>.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Internet Explorer","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft MS09-034 du 28 juillet 2009","url":"http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx"}]}
