{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"IBM InfoSphere Information Server version 8.7","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM InfoSphere Information Server version 8.1","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM InfoSphere Information Server version 8.5","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-0702","url":"https://www.cve.org/CVERecord?id=CVE-2012-0702"},{"name":"CVE-2012-2159","url":"https://www.cve.org/CVERecord?id=CVE-2012-2159"},{"name":"CVE-2012-0701","url":"https://www.cve.org/CVERecord?id=CVE-2012-0701"},{"name":"CVE-2012-4832","url":"https://www.cve.org/CVERecord?id=CVE-2012-4832"},{"name":"CVE-2012-0705","url":"https://www.cve.org/CVERecord?id=CVE-2012-0705"},{"name":"CVE-2012-0205","url":"https://www.cve.org/CVERecord?id=CVE-2012-0205"},{"name":"CVE-2012-0703","url":"https://www.cve.org/CVERecord?id=CVE-2012-0703"},{"name":"CVE-2012-0700","url":"https://www.cve.org/CVERecord?id=CVE-2012-0700"},{"name":"CVE-2012-4819","url":"https://www.cve.org/CVERecord?id=CVE-2012-4819"},{"name":"CVE-2012-0501","url":"https://www.cve.org/CVERecord?id=CVE-2012-0501"},{"name":"CVE-2012-0203","url":"https://www.cve.org/CVERecord?id=CVE-2012-0203"},{"name":"CVE-2012-2161","url":"https://www.cve.org/CVERecord?id=CVE-2012-2161"},{"name":"CVE-2012-0204","url":"https://www.cve.org/CVERecord?id=CVE-2012-0204"}],"links":[],"reference":"CERTA-2013-AVI-082","revisions":[{"description":"version initiale.","revision_date":"2013-01-31T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"},{"description":"Ex\u00e9cution de code arbitraire"},{"description":"Injection de code indirecte \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">IBM InfoSphere Information Server</span>. Certaines\nd'entre elles permettent \u00e0 un attaquant d'ex\u00e9cuter du code arbitraire au\nmoyen d'un fichier DLL sp\u00e9cialement con\u00e7u.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans IBM InfoSphere Information Server Suite","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 IBM swg21623501 du 25 janvier 2013","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21623501"}]}
