{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Ionix Optical Transport Management Suite (Ionix OTM) version 5.1 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Ionix Service Assurance Management Suite (Ionix SAM) version 8.1.0.6 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Ionix IP Management Suite (Ionix IP) version 8.1.1.1 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Ionix Adapter for Alcatel-Lucent 5620 SAM EMS (Ionix ASAM) version 3.2.0.2 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Ionix Application Connectivity Monitor (Ionix ACM) version 2.3 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Ionix MPLS Management Suite (Ionix MPLS) version 4.0.0 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Ionix Server Manager (EISM) version 3.0 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Ionix Storage Insight for Availability Suite (Ionix SIA) version 2.3.1 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Ionix VoIP Availability Management Suite (Ionix VoIP AM) version 4.0.0.3 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Ionix Network Protocol Management Suite (Ionix NPM) version 3.1 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Ionix IPv6 Management Suite (Ionix IPv6) version 2.0.2 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Ionix Multicast Manager (Ionix MCAST) version 2.1 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 permet \u00e0 une personne malintentionn\u00e9e, en envoyant un\npaquet TCP ou UDP sp\u00e9cialement con\u00e7u, de provoquer un d\u00e9ni se service \u00e0\ndistance ou potentiellement une ex\u00e9cution de code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2011-2738","url":"https://www.cve.org/CVERecord?id=CVE-2011-2738"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 EMC ESA-2011-029 :","url":"http://archives.neohapsis.com/archives/bugtraq/2011-09/ESA-2011-029.txt"}],"reference":"CERTA-2011-AVI-526","revisions":[{"description":"version initiale.","revision_date":"2011-09-20T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de tampon peut \u00eatre exploit\u00e9e afin\nde provoquer un d\u00e9ni de service \u00e0 distance et potentiellement une\nex\u00e9cution de code arbitraire.\n","title":"Vuln\u00e9rabilit\u00e9 dans EMC Ionix","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 EMC ESA-2011-029 du 14 septembre 2011","url":null}]}
