{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Asterisk Open Source versions 1.6.1.13 et ant\u00e9rieures ;","product":{"name":"Asterisk","vendor":{"name":"Asterisk","scada":false}}},{"description":"Asterisk Business Edition C3 versions C.3.3.1 et ant\u00e9rieures.","product":{"name":"Asterisk","vendor":{"name":"Asterisk","scada":false}}},{"description":"Asterisk Open Source versions 1.6.2.1 et ant\u00e9rieures ;","product":{"name":"Asterisk","vendor":{"name":"Asterisk","scada":false}}},{"description":"Asterisk Open Source versions 1.6.0.21 et ant\u00e9rieures ;","product":{"name":"Asterisk","vendor":{"name":"Asterisk","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 est pr\u00e9sente dans le produit de t\u00e9l\u00e9phonie sur IP\nAsterisk. Cette faille permet \u00e0 un utilisateur distant de provoquer un\nd\u00e9ni de service de l'application vuln\u00e9rable par le biais d'un paquet SDP\n(Session Description Protocol) construit de fa\u00e7on particuli\u00e8re.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2010-0441","url":"https://www.cve.org/CVERecord?id=CVE-2010-0441"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Asterisk AST-2010-001 du 03 f\u00e9vrier    2010 :","url":"http://downloads.asterisk.org/pub/security/AST-2010-001.html"}],"reference":"CERTA-2010-AVI-051","revisions":[{"description":"version initiale.","revision_date":"2010-02-04T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 affectant Asterisk permet \u00e0 un utilisateur distant de\nprovoquer un d\u00e9ni de service.\n","title":"Vuln\u00e9rabilit\u00e9 dans Asterisk","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Asterisk AST-2010-001 du 03 f\u00e9vrier 2010","url":null}]}
