{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Windows Server 2003 \u00c9dition x64 Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows XP Professionnel \u00c9dition x64 Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2003 avec SP2 pour syst\u00e8mes Itanium.","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows XP Service Pack 3 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}},{"description":"Windows Server 2003 Service Pack 2 ;","product":{"name":"Windows","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 existe dans le protocole Bureau \u00e0 distance de Windows.\nElle permet \u00e0 une personne malintentionn\u00e9e de causer un d\u00e9ni de service\n\u00e0 distance gr\u00e2ce \u00e0 l'envoi de paquets RDP sp\u00e9cialement con\u00e7us.\n\nCette faille est d'ores et d\u00e9j\u00e0 utilis\u00e9e dans le cadre d'attaques\ncibl\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2011-1968","url":"https://www.cve.org/CVERecord?id=CVE-2011-1968"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft MS11-065 du 09 ao\u00fbt 2011 :","url":"http://www.microsoft.com/france/technet/security/Bulletin/MS11-065.mspx"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft MS11-065 du 09 ao\u00fbt 2011 :","url":"http://www.microsoft.com/technet/security/Bulletin/MS11-065.mspx"}],"reference":"CERTA-2011-AVI-441","revisions":[{"description":"version initiale.","revision_date":"2011-08-10T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"}],"summary":"Un vuln\u00e9rabilit\u00e9 permettant \u00e0 une personne malintentionn\u00e9e d'effectuer\nun d\u00e9ni de service distant a \u00e9t\u00e9 d\u00e9couverte dans le protocole <span\nclass=\"textit\">Bureau \u00e0 distance</span> (RDP) de <span\nclass=\"textit\">Windows</span>.\n","title":"Vuln\u00e9rabilit\u00e9 dans la protocole RDP de Microsoft Windows","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft MS-11-065 du 09 ao\u00fbt 2011","url":null}]}
