{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Wireshark versions 1.2.7 et ant\u00e9rieures.","product":{"name":"Wireshark","vendor":{"name":"Wireshark","scada":false}}},{"description":"Wireshark versions 1.0.12 et ant\u00e9rieures ;","product":{"name":"Wireshark","vendor":{"name":"Wireshark","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 relative \u00e0 l'analyseur de protocole DOCSIS (Data Over\nCable Service Interface Specifications) est pr\u00e9sente dans Wireshark.\nElle permet \u00e0 un utilisateur distant de provoquer un d\u00e9ni de service de\nl'application vuln\u00e9rable.\n\n## Solution\n\nLes versions 1.0.13 et 1.2.8 corrigent le probl\u00e8me :\n\n    http://www.wireshark.org/download.html\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2010-1455","url":"https://www.cve.org/CVERecord?id=CVE-2010-1455"}],"links":[{"title":"Site de Wireshark :","url":"http://www.wireshark.org"}],"reference":"CERTA-2010-AVI-200","revisions":[{"description":"version initiale.","revision_date":"2010-05-06T00:00:00.000000"},{"description":"ajout de la r\u00e9f\u00e9rence CVE.","revision_date":"2010-06-11T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans Wireshark permet \u00e0 un utilisateur distant de\nprovoquer un d\u00e9ni de service.\n","title":"Vuln\u00e9rabilit\u00e9 dans Wireshark","vendor_advisories":[{"published_at":null,"title":"Bulletins de s\u00e9curit\u00e9 Wireshark du 05 mai 2010","url":"http://www.wireshark.org/security/wnpa-sec-2010-04.html"}]}
