{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Wireshark 1.2.x.","product":{"name":"Wireshark","vendor":{"name":"Wireshark","scada":false}}},{"description":"Wireshark 0.10.x ;","product":{"name":"Wireshark","vendor":{"name":"Wireshark","scada":false}}},{"description":"Wireshark 1.0.x ;","product":{"name":"Wireshark","vendor":{"name":"Wireshark","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans Wireshark :\n\n-   La premi\u00e8re (CVE-2009-2560), n'affectant pas les versions\n    sup\u00e9rieures \u00e0 1.2.0, concerne l'analyseur de protocole RADIUS ;\n-   la seconde (CVE-2009-3549), n'affectant que la branche 1.2.x, est\n    relative \u00e0 l'analyseur de protocole Paltalk ;\n-   la troisi\u00e8me (CVE-2009-3550) concerne l'analyseur de protocole\n    DCERPC/NT ;\n-   la derni\u00e8re (CVE-2009-3551), n'affectant que la branche 1.2.x, est\n    relative \u00e0 l'analyseur de protocole SMB.\n\nToutes ces vuln\u00e9rabilit\u00e9s permettent \u00e0 un utilisateur distant\nmalintentionn\u00e9 de provoquer un d\u00e9ni de service de l'application\nvuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2009-3549","url":"https://www.cve.org/CVERecord?id=CVE-2009-3549"},{"name":"CVE-2009-3550","url":"https://www.cve.org/CVERecord?id=CVE-2009-3550"},{"name":"CVE-2009-2560","url":"https://www.cve.org/CVERecord?id=CVE-2009-2560"},{"name":"CVE-2009-3551","url":"https://www.cve.org/CVERecord?id=CVE-2009-3551"}],"links":[{"title":"Bulletins de s\u00e9curit\u00e9s Wireshark wnpa-sec-2009-07 et    wnpa-sec-2009-08 du 26 octobre 2009 :","url":"http://www.wireshark.org/security/wnpa-sec-2009-08.html"},{"title":"Bulletins de s\u00e9curit\u00e9s Wireshark wnpa-sec-2009-07 et    wnpa-sec-2009-08 du 26 octobre 2009 :","url":"http://www.wireshark.org/security/wnpa-sec-2009-07.html"}],"reference":"CERTA-2009-AVI-463","revisions":[{"description":"version initiale.","revision_date":"2009-10-28T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"}],"summary":"Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Wireshark permettent \u00e0 un\nutilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni de service.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Wireshark","vendor_advisories":[{"published_at":null,"title":"Bulletins de s\u00e9curit\u00e9 Wireshark wnpa-sec-2009-07 et wnpa-sec-2009-08 du 26 octobre 2009","url":null}]}
