{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"CTPView 7.1, 7.2 et 7.3","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"CTPOS 7.0, 7.1, 7.2 et 7.3","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"ScreenOS versions ant\u00e9rieures \u00e0 6.3.0r24","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Junos OS toutes versions sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-9310","url":"https://www.cve.org/CVERecord?id=CVE-2016-9310"},{"name":"CVE-2017-2341","url":"https://www.cve.org/CVERecord?id=CVE-2017-2341"},{"name":"CVE-2017-3135","url":"https://www.cve.org/CVERecord?id=CVE-2017-3135"},{"name":"CVE-2017-2346","url":"https://www.cve.org/CVERecord?id=CVE-2017-2346"},{"name":"CVE-2016-7426","url":"https://www.cve.org/CVERecord?id=CVE-2016-7426"},{"name":"CVE-2017-2347","url":"https://www.cve.org/CVERecord?id=CVE-2017-2347"},{"name":"CVE-2017-2338","url":"https://www.cve.org/CVERecord?id=CVE-2017-2338"},{"name":"CVE-2017-2348","url":"https://www.cve.org/CVERecord?id=CVE-2017-2348"},{"name":"CVE-2017-3731","url":"https://www.cve.org/CVERecord?id=CVE-2017-3731"},{"name":"CVE-2016-7433","url":"https://www.cve.org/CVERecord?id=CVE-2016-7433"},{"name":"CVE-2016-7429","url":"https://www.cve.org/CVERecord?id=CVE-2016-7429"},{"name":"CVE-2016-9311","url":"https://www.cve.org/CVERecord?id=CVE-2016-9311"},{"name":"CVE-2015-8138","url":"https://www.cve.org/CVERecord?id=CVE-2015-8138"},{"name":"CVE-2016-7434","url":"https://www.cve.org/CVERecord?id=CVE-2016-7434"},{"name":"CVE-2017-2336","url":"https://www.cve.org/CVERecord?id=CVE-2017-2336"},{"name":"CVE-2017-2337","url":"https://www.cve.org/CVERecord?id=CVE-2017-2337"},{"name":"CVE-2016-7427","url":"https://www.cve.org/CVERecord?id=CVE-2016-7427"},{"name":"CVE-2017-3732","url":"https://www.cve.org/CVERecord?id=CVE-2017-3732"},{"name":"CVE-2017-10605","url":"https://www.cve.org/CVERecord?id=CVE-2017-10605"},{"name":"CVE-2017-2344","url":"https://www.cve.org/CVERecord?id=CVE-2017-2344"},{"name":"CVE-2017-2345","url":"https://www.cve.org/CVERecord?id=CVE-2017-2345"},{"name":"CVE-2017-2343","url":"https://www.cve.org/CVERecord?id=CVE-2017-2343"},{"name":"CVE-2017-2339","url":"https://www.cve.org/CVERecord?id=CVE-2017-2339"},{"name":"CVE-2016-7431","url":"https://www.cve.org/CVERecord?id=CVE-2016-7431"},{"name":"CVE-2016-7055","url":"https://www.cve.org/CVERecord?id=CVE-2016-7055"},{"name":"CVE-2016-1887","url":"https://www.cve.org/CVERecord?id=CVE-2016-1887"},{"name":"CVE-2016-9312","url":"https://www.cve.org/CVERecord?id=CVE-2016-9312"},{"name":"CVE-2016-7428","url":"https://www.cve.org/CVERecord?id=CVE-2016-7428"},{"name":"CVE-2016-3074","url":"https://www.cve.org/CVERecord?id=CVE-2016-3074"},{"name":"CVE-2017-2314","url":"https://www.cve.org/CVERecord?id=CVE-2017-2314"},{"name":"CVE-2017-2342","url":"https://www.cve.org/CVERecord?id=CVE-2017-2342"},{"name":"CVE-2017-2335","url":"https://www.cve.org/CVERecord?id=CVE-2017-2335"}],"links":[],"reference":"CERTFR-2017-AVI-212","revisions":[{"description":"version initiale.","revision_date":"2017-07-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Juniper</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0\ndistance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10797 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10797&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10794 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10794&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10789 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10789&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10800 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10800&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10793 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10793&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10791 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10791&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10775 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10775&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10795 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10795&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10790 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10790&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10779 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10779&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10787 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10787&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10799 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10799&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10796 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10796&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10792 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10792&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10798 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10798&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10782 du 12 juillet 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10782&cat=SIRT_1&actp=LIST"}]}
