{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Xen 3.x ;","product":{"name":"Xen","vendor":{"name":"XEN","scada":false}}},{"description":"Citrix XenServer 5.5 ;","product":{"name":"N/A","vendor":{"name":"XEN","scada":false}}},{"description":"Citrix XenServer 5.6.","product":{"name":"N/A","vendor":{"name":"XEN","scada":false}}},{"description":"Citrix XenServer 5.0 ;","product":{"name":"N/A","vendor":{"name":"XEN","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9, caus\u00e9e par un manque de contr\u00f4le lors de l'appel \u00e0 la\nversion x86_64 de la macro \\_\\_addr_ok(), permet \u00e0 une personne\nmalveillante de provoquer l'arr\u00eat inopin\u00e9 du syst\u00e8me h\u00f4te depuis un\nsyst\u00e8me virtualis\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2011-2901","url":"https://www.cve.org/CVERecord?id=CVE-2011-2901"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Citrix CTX130325 du 06 septembre 2011    :","url":"http://support.citrix.com/article/CTX130325"},{"title":"Bulletin de s\u00e9curit\u00e9 Xen OpenWall du 02 septembre 2011 :","url":"http://www.openwall.com/lists/oss-security/2011/09/02/2"}],"reference":"CERTA-2011-AVI-500","revisions":[{"description":"version initiale.","revision_date":"2011-09-08T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"}],"summary":"Une vuln\u00e9rabilit\u00e9 Xen permet \u00e0 une personne malveillante de provoquer un\nd\u00e9ni de service du syst\u00e8me h\u00f4te depuis un syst\u00e8me virtualis\u00e9.\n","title":"Vuln\u00e9rabilit\u00e9 dans Xen","vendor_advisories":[]}
