{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Pidgin versions ant\u00e9rieures \u00e0 2.10.4.","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-2214","url":"https://www.cve.org/CVERecord?id=CVE-2012-2214"},{"name":"CVE-2012-2318","url":"https://www.cve.org/CVERecord?id=CVE-2012-2318"}],"links":[],"reference":"CERTA-2012-AVI-261","revisions":[{"description":"version initiale.","revision_date":"2012-05-09T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"}],"summary":"Deux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Pidgin. La premi\u00e8re est li\u00e9e\n\u00e0 la gestion des requ\u00eates de transfert de fichiers, la seconde est due \u00e0\nla gestion des messages contenant des encodages particuliers de\ncaract\u00e8res. Ces deux vuln\u00e9rabilit\u00e9s peuvent \u00eatre exploit\u00e9es \u00e0 distance\npour provoquer un d\u00e9ni de service du client Pidgin.\n","title":"Vuln\u00e9rabilit\u00e9s dans Pidgin","vendor_advisories":[{"published_at":null,"title":"Bulletins de s\u00e9curit\u00e9 Pidgin du 06 mai 2012","url":"http://www.pidgin.im/news/security/?id=63"}]}
