{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Xen 4.1 ;","product":{"name":"Xen","vendor":{"name":"XEN","scada":false}}},{"description":"Xen 3.4 et ant\u00e9rieures.","product":{"name":"Xen","vendor":{"name":"XEN","scada":false}}},{"description":"Xen 4.0 ;","product":{"name":"Xen","vendor":{"name":"XEN","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-3433","url":"https://www.cve.org/CVERecord?id=CVE-2012-3433"}],"links":[],"reference":"CERTA-2012-AVI-428","revisions":[{"description":"version initiale.","revision_date":"2012-08-13T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"}],"summary":"Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans <span class=\"textit\">Xen</span>.\nUne machine invit\u00e9e peut modifier son espace d'adressage physique et\nainsi ralentir la r\u00e9solution des pages partag\u00e9es. Un utilisateur\nmalintentionn\u00e9 peut ainsi rendre inutilisable la machine h\u00f4te en\nprovoquant un \u00ab kernel panic \u00bb.\n","title":"Vuln\u00e9rabilit\u00e9 dans Xen","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Xen XSA-11 du 09 ao\u00fbt 2012","url":"http://lists.xen.org/archives/html/xen-devel/2012-08/msg00855.html"}]}
