{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Microsoft Outlook 2016 (\u00e9dition 32 bits)","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Office LTSC 2021 pour \u00e9ditions 64 bits","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Excel 2013 RT Service Pack 1","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Office LTSC 2021 pour \u00e9ditions 32 bits","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft OneNote pour Universal","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Office 2019 pour \u00e9ditions 32 bits","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Office 2019 pour Mac","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Office 2019 pour \u00e9ditions 64 bits","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Office LTSC pour Mac 2021","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Excel 2013 Service Pack 1 (\u00e9ditions 64 bits)","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Outlook 2013 (\u00e9ditions 64 bits)","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Excel 2016 (\u00e9dition 32 bits)","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Excel 2013 Service Pack 1 (\u00e9ditions 32 bits)","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Office Online Server","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft SharePoint Server Subscription Edition","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft SharePoint Enterprise Server 2016","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Outlook 2016 (\u00e9dition 64 bits)","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Excel 2016 (\u00e9dition 64 bits)","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft SharePoint Server 2019","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Outlook 2013 (\u00e9ditions 32 bits)","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Outlook 2013 RT Service Pack 1","product":{"name":"Office","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-33131","url":"https://www.cve.org/CVERecord?id=CVE-2023-33131"},{"name":"CVE-2023-29357","url":"https://www.cve.org/CVERecord?id=CVE-2023-29357"},{"name":"CVE-2023-33137","url":"https://www.cve.org/CVERecord?id=CVE-2023-33137"},{"name":"CVE-2023-33132","url":"https://www.cve.org/CVERecord?id=CVE-2023-33132"},{"name":"CVE-2023-33133","url":"https://www.cve.org/CVERecord?id=CVE-2023-33133"},{"name":"CVE-2023-33130","url":"https://www.cve.org/CVERecord?id=CVE-2023-33130"},{"name":"CVE-2023-33129","url":"https://www.cve.org/CVERecord?id=CVE-2023-33129"},{"name":"CVE-2023-33146","url":"https://www.cve.org/CVERecord?id=CVE-2023-33146"},{"name":"CVE-2023-33140","url":"https://www.cve.org/CVERecord?id=CVE-2023-33140"},{"name":"CVE-2023-32029","url":"https://www.cve.org/CVERecord?id=CVE-2023-32029"},{"name":"CVE-2023-33142","url":"https://www.cve.org/CVERecord?id=CVE-2023-33142"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33140 du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33140"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32029 du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32029"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29357 du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29357"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33131 du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33131"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33129 du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33129"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33142 du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33142"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33146 du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33146"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33130 du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33130"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33137 du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33137"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33133 du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33133"},{"title":"Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33132 du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33132"}],"reference":"CERTFR-2023-AVI-0461","revisions":[{"description":"Version initiale","revision_date":"2023-06-14T00:00:00.000000"}],"risks":[{"description":"Usurpation d'identit\u00e9"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"D\u00e9ni de service"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Microsoft Office</span>. Elles permettent \u00e0 un attaquant\nde provoquer un d\u00e9ni de service, une usurpation d'identit\u00e9, une\nex\u00e9cution de code \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Office","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft du 13 juin 2023","url":"https://msrc.microsoft.com/update-guide/"}]}
