{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"versions ant\u00e9rieures \u00e0 Wireshark 1.4.15 pour la branche 1.4.","product":{"name":"Wireshark","vendor":{"name":"Wireshark","scada":false}}},{"description":"versions ant\u00e9rieures \u00e0 Wireshark 1.6.10 pour la branche 1.6 ;","product":{"name":"Wireshark","vendor":{"name":"Wireshark","scada":false}}},{"description":"Versions ant\u00e9rieures \u00e0 Wireshark 1.8.2 pour la branche 1.8 ;","product":{"name":"Wireshark","vendor":{"name":"Wireshark","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-4289","url":"https://www.cve.org/CVERecord?id=CVE-2012-4289"},{"name":"CVE-2012-4292","url":"https://www.cve.org/CVERecord?id=CVE-2012-4292"},{"name":"CVE-2012-4293","url":"https://www.cve.org/CVERecord?id=CVE-2012-4293"},{"name":"CVE-2012-4291","url":"https://www.cve.org/CVERecord?id=CVE-2012-4291"},{"name":"CVE-2012-4288","url":"https://www.cve.org/CVERecord?id=CVE-2012-4288"},{"name":"CVE-2012-4286","url":"https://www.cve.org/CVERecord?id=CVE-2012-4286"},{"name":"CVE-2012-4298","url":"https://www.cve.org/CVERecord?id=CVE-2012-4298"},{"name":"CVE-2012-4297","url":"https://www.cve.org/CVERecord?id=CVE-2012-4297"},{"name":"CVE-2012-4285","url":"https://www.cve.org/CVERecord?id=CVE-2012-4285"},{"name":"CVE-2012-4290","url":"https://www.cve.org/CVERecord?id=CVE-2012-4290"},{"name":"CVE-2012-4287","url":"https://www.cve.org/CVERecord?id=CVE-2012-4287"},{"name":"CVE-2012-4295","url":"https://www.cve.org/CVERecord?id=CVE-2012-4295"},{"name":"CVE-2012-4296","url":"https://www.cve.org/CVERecord?id=CVE-2012-4296"},{"name":"CVE-2012-4294","url":"https://www.cve.org/CVERecord?id=CVE-2012-4294"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-13 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-13.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-20 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-20.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-24 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-24.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-22 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-22.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-23 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-23.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-18 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-18.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-14 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-14.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-25 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-25.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-17 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-17.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-21 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-21.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-15 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-15.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-19 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-19.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2012-16 du 15 ao\u00fbt    2012 :","url":"http://www.wireshark.org/security/wnpa-sec-2012-16.html"}],"reference":"CERTA-2012-AVI-457","revisions":[{"description":"version initiale.","revision_date":"2012-08-22T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Quatorze vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Wireshark</span>. Elles concernent diff\u00e9rents dissecteurs\naffect\u00e9s par des vuln\u00e9rabilit\u00e9s allant de la division par z\u00e9ro au\nd\u00e9bordement de m\u00e9moire tampon.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Wireshark","vendor_advisories":[{"published_at":null,"title":"Bulletins de s\u00e9curit\u00e9 Wireshark du 15 ao\u00fbt 2012","url":null}]}
