{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Windows Vista Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Vista x64 Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 pour syst\u00e8mes x64 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 pour syst\u00e8mes Itanium ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2.","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Vista x64 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Vista x64 Service Pack 1 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Vista Service Pack 1 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 pour syst\u00e8mes 32 bits ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2008 pour syst\u00e8mes Itanium Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Vista ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne seule de ces trois vuln\u00e9rabilit\u00e9s a \u00e9t\u00e9 rendue publique. Cette\nvuln\u00e9rabilit\u00e9 permet l'ex\u00e9cution de code arbitraire \u00e0 distance par le\nbiais d'un paquet SMB\u00a0sp\u00e9cifiquement con\u00e7u sur les ordinateurs ayant\nactiv\u00e9 le service serveur SMBv2.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft MS09-050 du 13 octobre 2009    :","url":"http://www.microsoft.com/france/technet/security/Bulletin/MS09-050.mspx"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft MS09-050 du 13 octobre 2009    :","url":"http://www.microsoft.com/technet/security/Bulletin/MS09-050.mspx"}],"reference":"CERTA-2009-AVI-443","revisions":[{"description":"version initiale.","revision_date":"2009-10-14T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Trois vuln\u00e9rabilit\u00e9s dans SMBv2 (Server Message Block) sous Windows ont\n\u00e9t\u00e9 corrig\u00e9es, dont une permettant l'ex\u00e9cution de code arbitraire \u00e0\ndistance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s de SMBv2 dans Microsoft Windows","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft MS09-050 du 13 Octobre 2009","url":null}]}
