{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Symantec Critical System Protection (SCSP) versions ant\u00e9rieures \u00e0 5.2.9 MP6","product":{"name":"N/A","vendor":{"name":"Symantec","scada":false}}},{"description":"Symantec Data Center Security: Server Advanced Server (DCS:SA) versions ant\u00e9rieures \u00e0 6.5 MP1","product":{"name":"N/A","vendor":{"name":"Symantec","scada":false}}},{"description":"Symantec Data Center Security: Server Advanced Server (DCS:SA) versions 6.6 ant\u00e9rieures \u00e0 6.6 MP1","product":{"name":"N/A","vendor":{"name":"Symantec","scada":false}}},{"description":"Symantec Embedded Security: Critical System Protection for Controllers and Devices (SES:CSP) versions ant\u00e9rieures \u00e0 6.5.0 MP1","product":{"name":"N/A","vendor":{"name":"Symantec","scada":false}}},{"description":"Symantec Embedded Security: Critical System Protection (SES:CSP) versions ant\u00e9rieures \u00e0 1.0 MP5","product":{"name":"N/A","vendor":{"name":"Symantec","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2015-8799","url":"https://www.cve.org/CVERecord?id=CVE-2015-8799"},{"name":"CVE-2015-8798","url":"https://www.cve.org/CVERecord?id=CVE-2015-8798"},{"name":"CVE-2015-8800","url":"https://www.cve.org/CVERecord?id=CVE-2015-8800"},{"name":"CVE-2015-8157","url":"https://www.cve.org/CVERecord?id=CVE-2015-8157"}],"links":[],"reference":"CERTFR-2016-AVI-194","revisions":[{"description":"version initiale.","revision_date":"2016-06-08T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Symantec</span>. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\ncontournement de la politique de s\u00e9curit\u00e9 et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Symantec","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Symantec SYM16-009 du 07 juin 2016","url":"https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160607_00"}]}
