{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"IBM HTTP Server 6.1.x ;","product":{"name":"HTTP Server","vendor":{"name":"Apache","scada":false}}},{"description":"IBM HTTP Server 6.0.x ;","product":{"name":"HTTP Server","vendor":{"name":"Apache","scada":false}}},{"description":"IBM HTTP Server 7.0.x.","product":{"name":"HTTP Server","vendor":{"name":"Apache","scada":false}}},{"description":"APR-Utility versions ant\u00e9rieures \u00e0 la 1.3.9 ;","product":{"name":"N/A","vendor":{"name":"Apache","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s, de type d\u00e9passement d'entier, ont \u00e9t\u00e9\nd\u00e9couvertes dans les outils de la librairie d'ex\u00e9cution Apache Portable\nRuntime (APR-Utility). Ces vuln\u00e9rabilit\u00e9s permettent \u00e0 une personne\ndistante malintentionn\u00e9e d'ex\u00e9cuter du code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2009-2412","url":"https://www.cve.org/CVERecord?id=CVE-2009-2412"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 IBM PK93225 :","url":"http://www-01.ibm.com/support/docview.wss?uid=swg1PK93225"}],"reference":"CERTA-2009-AVI-323","revisions":[{"description":"version initiale.","revision_date":"2009-08-11T00:00:00.000000"},{"description":"ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 IBM PK93225.","revision_date":"2009-10-20T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s dans APR-Utility permettent \u00e0 une personne\nmalintentionn\u00e9e d'ex\u00e9cuter du code arbitraire \u00e0 distance.\n","title":"Vuln\u00e9rabilit\u00e9s dans Apache APR-Utility","vendor_advisories":[{"published_at":null,"title":"Note de nouvelle version APR-Utility 1.3.9","url":"http://www.apache.org/dist/apr/Announcement1.3.html"}]}
