{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Oracle MySQL Server versions 5.5.48 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle MySQL Server versions 5.6.29 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle MySQL Server versions 5.7.11 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle MySQL Enterprise Monitor versions 3.1.2 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle MySQL Enterprise Monitor versions 3.0.25 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-2047","url":"https://www.cve.org/CVERecord?id=CVE-2016-2047"},{"name":"CVE-2016-0652","url":"https://www.cve.org/CVERecord?id=CVE-2016-0652"},{"name":"CVE-2016-0662","url":"https://www.cve.org/CVERecord?id=CVE-2016-0662"},{"name":"CVE-2016-0649","url":"https://www.cve.org/CVERecord?id=CVE-2016-0649"},{"name":"CVE-2016-0641","url":"https://www.cve.org/CVERecord?id=CVE-2016-0641"},{"name":"CVE-2016-0648","url":"https://www.cve.org/CVERecord?id=CVE-2016-0648"},{"name":"CVE-2016-0658","url":"https://www.cve.org/CVERecord?id=CVE-2016-0658"},{"name":"CVE-2016-0640","url":"https://www.cve.org/CVERecord?id=CVE-2016-0640"},{"name":"CVE-2016-0656","url":"https://www.cve.org/CVERecord?id=CVE-2016-0656"},{"name":"CVE-2015-3194","url":"https://www.cve.org/CVERecord?id=CVE-2015-3194"},{"name":"CVE-2016-0665","url":"https://www.cve.org/CVERecord?id=CVE-2016-0665"},{"name":"CVE-2016-0668","url":"https://www.cve.org/CVERecord?id=CVE-2016-0668"},{"name":"CVE-2016-0642","url":"https://www.cve.org/CVERecord?id=CVE-2016-0642"},{"name":"CVE-2016-0644","url":"https://www.cve.org/CVERecord?id=CVE-2016-0644"},{"name":"CVE-2016-0639","url":"https://www.cve.org/CVERecord?id=CVE-2016-0639"},{"name":"CVE-2016-0643","url":"https://www.cve.org/CVERecord?id=CVE-2016-0643"},{"name":"CVE-2016-0666","url":"https://www.cve.org/CVERecord?id=CVE-2016-0666"},{"name":"CVE-2016-0651","url":"https://www.cve.org/CVERecord?id=CVE-2016-0651"},{"name":"CVE-2016-0646","url":"https://www.cve.org/CVERecord?id=CVE-2016-0646"},{"name":"CVE-2016-0650","url":"https://www.cve.org/CVERecord?id=CVE-2016-0650"},{"name":"CVE-2016-0647","url":"https://www.cve.org/CVERecord?id=CVE-2016-0647"},{"name":"CVE-2016-0657","url":"https://www.cve.org/CVERecord?id=CVE-2016-0657"},{"name":"CVE-2016-0653","url":"https://www.cve.org/CVERecord?id=CVE-2016-0653"},{"name":"CVE-2016-3461","url":"https://www.cve.org/CVERecord?id=CVE-2016-3461"},{"name":"CVE-2016-0654","url":"https://www.cve.org/CVERecord?id=CVE-2016-0654"},{"name":"CVE-2016-0655","url":"https://www.cve.org/CVERecord?id=CVE-2016-0655"},{"name":"CVE-2016-0659","url":"https://www.cve.org/CVERecord?id=CVE-2016-0659"},{"name":"CVE-2016-0661","url":"https://www.cve.org/CVERecord?id=CVE-2016-0661"},{"name":"CVE-2016-0705","url":"https://www.cve.org/CVERecord?id=CVE-2016-0705"},{"name":"CVE-2016-0663","url":"https://www.cve.org/CVERecord?id=CVE-2016-0663"},{"name":"CVE-2016-0667","url":"https://www.cve.org/CVERecord?id=CVE-2016-0667"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2016v3verbose du 19 avril    2016","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016verbose-2881709.html#MSQL"}],"reference":"CERTFR-2016-AVI-138","revisions":[{"description":"version initiale.","revision_date":"2016-04-20T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Oracle MySQL</span>. Certaines d'entre elles permettent \u00e0\nun attaquant de provoquer un d\u00e9ni de service \u00e0 distance, un\ncontournement de la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 l'int\u00e9grit\u00e9\ndes donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2016v3 du 19 avril 2016","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixMSQL"}]}
