{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"VMware ESX versions ant\u00e9rieures \u00e0 4.1 mise \u00e0 jour ESX410-201301401-SG","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}},{"description":"VMware ESXi versions ant\u00e9rieures \u00e0 4.1 mise \u00e0 jour ESXi410-201301401-SG","product":{"name":"ESXi","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCenter Server versions ant\u00e9rieures \u00e0 4.1 mise \u00e0 jour 3a","product":{"name":"vCenter Server","vendor":{"name":"VMware","scada":false}}},{"description":"VMware vCenter Client versions ant\u00e9rieures \u00e0 4.1 mise \u00e0 jour 3a","product":{"name":"N/A","vendor":{"name":"VMware","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-4244","url":"https://www.cve.org/CVERecord?id=CVE-2012-4244"},{"name":"CVE-2011-3970","url":"https://www.cve.org/CVERecord?id=CVE-2011-3970"},{"name":"CVE-2012-2871","url":"https://www.cve.org/CVERecord?id=CVE-2012-2871"},{"name":"CVE-2012-2870","url":"https://www.cve.org/CVERecord?id=CVE-2012-2870"},{"name":"CVE-2013-1405","url":"https://www.cve.org/CVERecord?id=CVE-2013-1405"},{"name":"CVE-2011-3102","url":"https://www.cve.org/CVERecord?id=CVE-2011-3102"},{"name":"CVE-2012-2807","url":"https://www.cve.org/CVERecord?id=CVE-2012-2807"},{"name":"CVE-2011-1202","url":"https://www.cve.org/CVERecord?id=CVE-2011-1202"},{"name":"CVE-2012-2825","url":"https://www.cve.org/CVERecord?id=CVE-2012-2825"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 VMware VMSA-2013-0001 du 31 janvier    2013","url":"http://www.vmware.com/security/advisories/VMSA-2013-0001.html"}],"reference":"CERTA-2013-AVI-088","revisions":[{"description":"version initiale.","revision_date":"2013-02-04T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">VMware vSphere</span>. Plusieurs composants tiers ont \u00e9t\u00e9\ncorrig\u00e9s comme <span class=\"textit\">libxml2</span>, <span\nclass=\"textit\">bind</span> et <span class=\"textit\">xslt</span>. La\nvuln\u00e9rabilit\u00e9 la plus critique permet \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans VMware vSphere","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 VMware VMSA-2013-0001 du 31 janvier 2013","url":null}]}
