{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"VMware ESX version 4.1 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCO version 4.0.","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCenter version 5.0 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCOps version 1.0.x ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESXi version 3.5 ;","product":{"name":"ESXi","vendor":{"name":"VMware","scada":false}}},{"description":"VMware Update Manager version 5.0 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware Update Manager version 4.0 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCO version 4.1 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESXi version 4.1 ;","product":{"name":"ESXi","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCenter version 4.0 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCenter version 4.1 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCOps version 5.0.2 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESXi version 4.0 ;","product":{"name":"ESXi","vendor":{"name":"VMware","scada":false}}},{"description":"VMware VirtualCenter version 2.5 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware Update Manager version 4.1 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESXi version 5.0 ;","product":{"name":"ESXi","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESX version 4.0 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESX version 3.5 ;","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2011-1833","url":"https://www.cve.org/CVERecord?id=CVE-2011-1833"},{"name":"CVE-2012-0050","url":"https://www.cve.org/CVERecord?id=CVE-2012-0050"},{"name":"CVE-2011-4132","url":"https://www.cve.org/CVERecord?id=CVE-2011-4132"},{"name":"CVE-2011-4609","url":"https://www.cve.org/CVERecord?id=CVE-2011-4609"},{"name":"CVE-2012-0207","url":"https://www.cve.org/CVERecord?id=CVE-2012-0207"},{"name":"CVE-2011-5057","url":"https://www.cve.org/CVERecord?id=CVE-2011-5057"},{"name":"CVE-2010-4252","url":"https://www.cve.org/CVERecord?id=CVE-2010-4252"},{"name":"CVE-2011-4619","url":"https://www.cve.org/CVERecord?id=CVE-2011-4619"},{"name":"CVE-2012-2110","url":"https://www.cve.org/CVERecord?id=CVE-2012-2110"},{"name":"CVE-2011-4576","url":"https://www.cve.org/CVERecord?id=CVE-2011-4576"},{"name":"CVE-2011-2496","url":"https://www.cve.org/CVERecord?id=CVE-2011-2496"},{"name":"CVE-2009-5064","url":"https://www.cve.org/CVERecord?id=CVE-2009-5064"},{"name":"CVE-2011-4577","url":"https://www.cve.org/CVERecord?id=CVE-2011-4577"},{"name":"CVE-2009-5029","url":"https://www.cve.org/CVERecord?id=CVE-2009-5029"},{"name":"CVE-2012-1569","url":"https://www.cve.org/CVERecord?id=CVE-2012-1569"},{"name":"CVE-2011-4324","url":"https://www.cve.org/CVERecord?id=CVE-2011-4324"},{"name":"CVE-2011-4110","url":"https://www.cve.org/CVERecord?id=CVE-2011-4110"},{"name":"CVE-2011-4108","url":"https://www.cve.org/CVERecord?id=CVE-2011-4108"},{"name":"CVE-2012-1583","url":"https://www.cve.org/CVERecord?id=CVE-2012-1583"},{"name":"CVE-2010-2761","url":"https://www.cve.org/CVERecord?id=CVE-2010-2761"},{"name":"CVE-2012-0060","url":"https://www.cve.org/CVERecord?id=CVE-2012-0060"},{"name":"CVE-2012-0391","url":"https://www.cve.org/CVERecord?id=CVE-2012-0391"},{"name":"CVE-2011-4325","url":"https://www.cve.org/CVERecord?id=CVE-2011-4325"},{"name":"CVE-2010-0830","url":"https://www.cve.org/CVERecord?id=CVE-2010-0830"},{"name":"CVE-2012-0061","url":"https://www.cve.org/CVERecord?id=CVE-2012-0061"},{"name":"CVE-2010-4180","url":"https://www.cve.org/CVERecord?id=CVE-2010-4180"},{"name":"CVE-2012-0864","url":"https://www.cve.org/CVERecord?id=CVE-2012-0864"},{"name":"CVE-2011-3209","url":"https://www.cve.org/CVERecord?id=CVE-2011-3209"},{"name":"CVE-2010-4410","url":"https://www.cve.org/CVERecord?id=CVE-2010-4410"},{"name":"CVE-2012-0392","url":"https://www.cve.org/CVERecord?id=CVE-2012-0392"},{"name":"CVE-2012-0394","url":"https://www.cve.org/CVERecord?id=CVE-2012-0394"},{"name":"CVE-2012-0815","url":"https://www.cve.org/CVERecord?id=CVE-2012-0815"},{"name":"CVE-2011-3188","url":"https://www.cve.org/CVERecord?id=CVE-2011-3188"},{"name":"CVE-2011-1020","url":"https://www.cve.org/CVERecord?id=CVE-2011-1020"},{"name":"CVE-2011-4109","url":"https://www.cve.org/CVERecord?id=CVE-2011-4109"},{"name":"CVE-2012-1573","url":"https://www.cve.org/CVERecord?id=CVE-2012-1573"},{"name":"CVE-2011-4128","url":"https://www.cve.org/CVERecord?id=CVE-2011-4128"},{"name":"CVE-2012-0841","url":"https://www.cve.org/CVERecord?id=CVE-2012-0841"},{"name":"CVE-2011-2484","url":"https://www.cve.org/CVERecord?id=CVE-2011-2484"},{"name":"CVE-2012-0393","url":"https://www.cve.org/CVERecord?id=CVE-2012-0393"},{"name":"CVE-2011-3597","url":"https://www.cve.org/CVERecord?id=CVE-2011-3597"},{"name":"CVE-2011-3363","url":"https://www.cve.org/CVERecord?id=CVE-2011-3363"},{"name":"CVE-2011-2699","url":"https://www.cve.org/CVERecord?id=CVE-2011-2699"},{"name":"CVE-2011-0014","url":"https://www.cve.org/CVERecord?id=CVE-2011-0014"},{"name":"CVE-2011-1089","url":"https://www.cve.org/CVERecord?id=CVE-2011-1089"}],"links":[],"reference":"CERTA-2012-AVI-479","revisions":[{"description":"version initiale.","revision_date":"2012-09-03T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits <span\nclass=\"textit\">VMware</span>. Elles concernent les \u00e9l\u00e9ments d'\u00e9diteurs\ntiers impl\u00e9ment\u00e9s dans les solutions. Les \u00e9l\u00e9ments suivants ont \u00e9t\u00e9s mis\n\u00e0 jour :\n\n-   Java Runtime Environment (JRE) ;\n-   OpenSSL ;\n-   le noyau ;\n-   Perl ;\n-   libxml2 ;\n-   glibc ;\n-   GnuTLS ;\n-   popt et rpm ;\n-   Apache struts.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans VMware","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 VMware VMSA-2012-0013 du 30 ao\u00fbt 2012","url":"http://www.vmware.com/security/advisories/VMSA-2012-0013.html"}]}
