{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Microsoft Windows Vista \u00c9dition x64, Windows Vista \u00c9dition x64 Service Pack 1 et Windows Vista \u00c9dition x64 Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows Server 2008 pour syst\u00e8mes Itanium et Windows Server 2008 pour syst\u00e8mes Itanium Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows Server 2008 pour syst\u00e8mes 32 bits et Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows Server 2008 pour syst\u00e8mes x64 et Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Windows Vista, Windows Vista Service Pack 1 et Windows Vista Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nL'impl\u00e9mentation du protocole IPv6 dans Microsoft Windows contient\nplusieurs vuln\u00e9rabilit\u00e9s qui permettent, entre autre, \u00e0 un utilisateur\ndistant malintentionn\u00e9 d'ex\u00e9cuter du code arbitraire.\n\nL'ex\u00e9cution du code s'effectue alors avec le privil\u00e8ge Syst\u00e8me et permet\nainsi de prendre le contr\u00f4le total de la machine.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2010-0239","url":"https://www.cve.org/CVERecord?id=CVE-2010-0239"},{"name":"CVE-2010-0242","url":"https://www.cve.org/CVERecord?id=CVE-2010-0242"},{"name":"CVE-2010-0240","url":"https://www.cve.org/CVERecord?id=CVE-2010-0240"},{"name":"CVE-2010-0241","url":"https://www.cve.org/CVERecord?id=CVE-2010-0241"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft MS10-009 du 10 f\u00e9vrier 2010    :","url":"http://www.microsoft.com/france/technet/security/Bulletin/MS10-009.mspx"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft MS10-009 du 10 f\u00e9vrier 2010    :","url":"http://www.microsoft.com/technet/security/Bulletin/MS10-009.mspx"}],"reference":"CERTA-2010-AVI-067","revisions":[{"description":"version initiale.","revision_date":"2010-02-10T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows TCP/IP permettent\nl'ex\u00e9cution de code \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows TCP/IP","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft MS10-009 du 09 f\u00e9vrier 2010","url":null}]}
