{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<p>Version du serveur HTTP <TT>Apache</TT>  2.2.0 \u00e0 2.2.14.</p>","content":"## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans les modules mod_isapi, mod_headers et\nmod_proxy_ajp permettent \u00e0 un utilisateur malveillant de provoquer un\nd\u00e9ni de service ou d'ex\u00e9cuter du code \u00e0 distance.\n\n## Solution\n\nInstaller la version 2.2.15 d'Apache HTTP serveur. La version 2.2.15\nint\u00e9gre la version \u00e0 jour de la librairie OpenSSL 0.9.8m et corrige\nainsi la vuln\u00e9rabilit\u00e9 CVE-2009-3555.\n","cves":[{"name":"CVE-2010-0434","url":"https://www.cve.org/CVERecord?id=CVE-2010-0434"},{"name":"CVE-2010-0425","url":"https://www.cve.org/CVERecord?id=CVE-2010-0425"},{"name":"CVE-2009-3555","url":"https://www.cve.org/CVERecord?id=CVE-2009-3555"},{"name":"CVE-2010-0408","url":"https://www.cve.org/CVERecord?id=CVE-2010-0408"}],"links":[{"title":"Vuln\u00e9rabilit\u00e9s du serveur HTTP APACHE 2.2 :","url":"http://httpd.apache.org/security/vulnerabilities_22.html"},{"title":"Annonce de la version 2.2.15 du serveur APACHE :","url":"http://www.apache.org/dist/httpd/Announcement2.2.html"},{"title":"Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2010:0168-1 du 25 mars    2010 :","url":"http://rhn.redhat.com/errata/RHSA-2010-0168.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Ubuntu USN-908-1 du 10 mars 2010 :","url":"http://www.ubuntu.com/usn/USN-908-1"}],"reference":"CERTA-2010-AVI-112","revisions":[{"description":"version initiale.","revision_date":"2010-03-08T00:00:00.000000"},{"description":"ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 RedHat et Ubuntu.","revision_date":"2010-03-26T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Des vuln\u00e9rabilit\u00e9s multiples dans les versions du serveur Apache de la\nbranche 2.2.0, ant\u00e9rieures \u00e0 la version 2.2.15 permettent \u00e0 un\nutilisateur malveillant d'ex\u00e9cuter du code \u00e0 distance, ou de provoquer\nun d\u00e9ni de service.\n","title":"Multiples vuln\u00e9rabilit\u00e9s du serveur HTTP Apache","vendor_advisories":[{"published_at":null,"title":"Mise en ligne de la version 2.2.15 du serveur HTTP Apache","url":null}]}
