{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"MacOS X Server 10.4.x (Universal) ;","product":{"name":"macOS","vendor":{"name":"Apple","scada":false}}},{"description":"MacOS X 10.5.8 ;","product":{"name":"macOS","vendor":{"name":"Apple","scada":false}}},{"description":"MacOS X 10.4.11 ;","product":{"name":"macOS","vendor":{"name":"Apple","scada":false}}},{"description":"MacOS X 10.6.","product":{"name":"macOS","vendor":{"name":"Apple","scada":false}}},{"description":"MacOS X Server 10.5 ;","product":{"name":"macOS","vendor":{"name":"Apple","scada":false}}},{"description":"MacOS X Server 10.4.x (PowerPC) ;","product":{"name":"macOS","vendor":{"name":"Apple","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s d'applications contenues dans MacOS X ont \u00e9t\u00e9\ncorrig\u00e9es. MacOS X 10.6 n'est concern\u00e9 que par les failles affectant le\nplugin Flash Player. Les vuln\u00e9rabilit\u00e9s permettent notamment l'ex\u00e9cution\nde code arbitraire \u00e0 distance, l'\u00e9l\u00e9vation de privil\u00e8ges et l'injection\nde code indirecte.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2009-1864","url":"https://www.cve.org/CVERecord?id=CVE-2009-1864"},{"name":"CVE-2009-2804","url":"https://www.cve.org/CVERecord?id=CVE-2009-2804"},{"name":"CVE-2009-1867","url":"https://www.cve.org/CVERecord?id=CVE-2009-1867"},{"name":"CVE-2009-2813","url":"https://www.cve.org/CVERecord?id=CVE-2009-2813"},{"name":"CVE-2009-0789","url":"https://www.cve.org/CVERecord?id=CVE-2009-0789"},{"name":"CVE-2009-2805","url":"https://www.cve.org/CVERecord?id=CVE-2009-2805"},{"name":"CVE-2009-0949","url":"https://www.cve.org/CVERecord?id=CVE-2009-0949"},{"name":"CVE-2009-2800","url":"https://www.cve.org/CVERecord?id=CVE-2009-2800"},{"name":"CVE-2009-1866","url":"https://www.cve.org/CVERecord?id=CVE-2009-1866"},{"name":"CVE-2009-2468","url":"https://www.cve.org/CVERecord?id=CVE-2009-2468"},{"name":"CVE-2008-2079","url":"https://www.cve.org/CVERecord?id=CVE-2008-2079"},{"name":"CVE-2009-1865","url":"https://www.cve.org/CVERecord?id=CVE-2009-1865"},{"name":"CVE-2009-1868","url":"https://www.cve.org/CVERecord?id=CVE-2009-1868"},{"name":"CVE-2009-0591","url":"https://www.cve.org/CVERecord?id=CVE-2009-0591"},{"name":"CVE-2008-5498","url":"https://www.cve.org/CVERecord?id=CVE-2008-5498"},{"name":"CVE-2009-1372","url":"https://www.cve.org/CVERecord?id=CVE-2009-1372"},{"name":"CVE-2009-2811","url":"https://www.cve.org/CVERecord?id=CVE-2009-2811"},{"name":"CVE-2009-2809","url":"https://www.cve.org/CVERecord?id=CVE-2009-2809"},{"name":"CVE-2009-1870","url":"https://www.cve.org/CVERecord?id=CVE-2009-1870"},{"name":"CVE-2009-1862","url":"https://www.cve.org/CVERecord?id=CVE-2009-1862"},{"name":"CVE-2009-2812","url":"https://www.cve.org/CVERecord?id=CVE-2009-2812"},{"name":"CVE-2009-1272","url":"https://www.cve.org/CVERecord?id=CVE-2009-1272"},{"name":"CVE-2009-1241","url":"https://www.cve.org/CVERecord?id=CVE-2009-1241"},{"name":"CVE-2009-0590","url":"https://www.cve.org/CVERecord?id=CVE-2009-0590"},{"name":"CVE-2009-1371","url":"https://www.cve.org/CVERecord?id=CVE-2009-1371"},{"name":"CVE-2008-6680","url":"https://www.cve.org/CVERecord?id=CVE-2008-6680"},{"name":"CVE-2009-1270","url":"https://www.cve.org/CVERecord?id=CVE-2009-1270"},{"name":"CVE-2009-1271","url":"https://www.cve.org/CVERecord?id=CVE-2009-1271"},{"name":"CVE-2009-2807","url":"https://www.cve.org/CVERecord?id=CVE-2009-2807"},{"name":"CVE-2009-2814","url":"https://www.cve.org/CVERecord?id=CVE-2009-2814"},{"name":"CVE-2009-1863","url":"https://www.cve.org/CVERecord?id=CVE-2009-1863"},{"name":"CVE-2009-1869","url":"https://www.cve.org/CVERecord?id=CVE-2009-1869"},{"name":"CVE-2009-2803","url":"https://www.cve.org/CVERecord?id=CVE-2009-2803"}],"links":[],"reference":"CERTA-2009-AVI-382","revisions":[{"description":"version initiale.","revision_date":"2009-09-11T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de code indirecte"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s permettant entre autres l'ex\u00e9cution de code\narbitraire \u00e0 distance ont \u00e9t\u00e9 corrig\u00e9es dans <span class=\"textit\">MacOS\nX</span>.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans MacOS X","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT3865 du 10 septembre 2009","url":"http://support.apple.com/kb/HT3865"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT3864 du 11 septembre 2009","url":"http://support.apple.com/kb/HT3864"}]}
