{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Time Capsule.","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"AirPort Extreme Base Station (802.11n) ;","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"AirPort Express Base Station (802.11n) ;","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nLa vuln\u00e9rabilit\u00e9 se trouve dans dhclient. Une personne malintentionn\u00e9e\npourrait envoyer des r\u00e9ponses DHCP malveillantes contenant des\nm\u00e9ta-caract\u00e8res du shell dans le hostname et ainsi ex\u00e9cuter des\ncommandes arbitraires \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2011-0997","url":"https://www.cve.org/CVERecord?id=CVE-2011-0997"}],"links":[],"reference":"CERTA-2011-AVI-637","revisions":[{"description":"version initiale.","revision_date":"2011-11-14T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans <span class=\"textit\">Time Capsule</span> et <span\nclass=\"textit\">AirPort Base Station</span> (802.11n) pourrait permettre\n\u00e0 une personne malintentionn\u00e9e d'ex\u00e9cuter du code arbitraire \u00e0 distance.\n","title":"Vuln\u00e9rabilit\u00e9 dans les produits Apple <SPAN class=\"textit\">Time Capsule</SPAN> et <SPAN class=\"textit\">AirPort Base Station</SPAN>","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT5005 du 11 novembre 2011","url":"http://support.apple.com/kb/HT5005"}]}
