Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-2699 (GCVE-0-2011-2699)
Vulnerability from cvelistv5 – Published: 2012-05-24 23:00 – Updated: 2024-08-06 23:08- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:08:23.768Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1027274",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1027274"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"name": "[oss-security] 20110720 Re: CVE request: kernel: ipv6: make fragment identifications less predictable",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/5"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723429"
},
{
"name": "MDVSA-2013:150",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-07-20T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-09-07T09:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "1027274",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1027274"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"name": "[oss-security] 20110720 Re: CVE request: kernel: ipv6: make fragment identifications less predictable",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/5"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723429"
},
{
"name": "MDVSA-2013:150",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-2699",
"datePublished": "2012-05-24T23:00:00.000Z",
"dateReserved": "2011-07-11T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:08:23.768Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GSD-2011-2699
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-2699",
"description": "The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.",
"id": "GSD-2011-2699",
"references": [
"https://www.suse.com/security/cve/CVE-2011-2699.html",
"https://access.redhat.com/errata/RHSA-2012:0358",
"https://access.redhat.com/errata/RHSA-2011:1465",
"https://access.redhat.com/errata/RHSA-2011:1386",
"https://alas.aws.amazon.com/cve/html/CVE-2011-2699.html",
"https://linux.oracle.com/cve/CVE-2011-2699.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-2699"
],
"details": "The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.",
"id": "GSD-2011-2699",
"modified": "2023-12-13T01:19:07.178756Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2699",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1",
"refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c",
"refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"name": "http://www.openwall.com/lists/oss-security/2011/07/20/5",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/5"
},
{
"name": "http://www.securitytracker.com/id?1027274",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1027274"
},
{
"name": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c",
"refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=723429",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723429"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2699"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1",
"refsource": "CONFIRM",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=723429",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723429"
},
{
"name": "[oss-security] 20110720 Re: CVE request: kernel: ipv6: make fragment identifications less predictable",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/5"
},
{
"name": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"name": "1027274",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1027274"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c",
"refsource": "MISC",
"tags": [],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-02-13T04:31Z",
"publishedDate": "2012-05-24T23:55Z"
}
}
}
FKIE_CVE-2011-2699
Vulnerability from fkie_nvd - Published: 2012-05-24 23:55 - Updated: 2025-04-11 00:51| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| redhat | enterprise_linux | 4.0 | |
| redhat | enterprise_mrg | 2.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "156989A4-23D9-434A-B512-9C0F3583D13D",
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6172AF57-B26D-45F8-BE3A-F75ABDF28F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C60FA8B1-1802-4522-A088-22171DCF7A93",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets."
},
{
"lang": "es",
"value": "La implementaci\u00f3n de IPv6 en el kernel de Linux antes de v3.1 no genera valores de los fragmentos de identificaci\u00f3n por separado para cada destino, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes remotos causar una denegaci\u00f3n de servicio (red interrumpida) mediante la predicci\u00f3n de estos valores y el env\u00edo de paquetes modificados."
}
],
"id": "CVE-2011-2699",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2012-05-24T23:55:01.963",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/5"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1027274"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723429"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1027274"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723429"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTA-2012-AVI-479
Vulnerability from certfr_avis - Published: 2012-09-03 - Updated: 2012-09-03
De multiples vulnérabilités ont été corrigées dans les produits VMware. Elles concernent les éléments d'éditeurs tiers implémentés dans les solutions. Les éléments suivants ont étés mis à jour :
- Java Runtime Environment (JRE) ;
- OpenSSL ;
- le noyau ;
- Perl ;
- libxml2 ;
- glibc ;
- GnuTLS ;
- popt et rpm ;
- Apache struts.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware ESX version 4.1 ; | ||
| VMware | N/A | VMware vCO version 4.0. | ||
| VMware | N/A | VMware vCenter version 5.0 ; | ||
| VMware | N/A | VMware vCOps version 1.0.x ; | ||
| VMware | ESXi | VMware ESXi version 3.5 ; | ||
| VMware | N/A | VMware Update Manager version 5.0 ; | ||
| VMware | N/A | VMware Update Manager version 4.0 ; | ||
| VMware | N/A | VMware vCO version 4.1 ; | ||
| VMware | ESXi | VMware ESXi version 4.1 ; | ||
| VMware | N/A | VMware vCenter version 4.0 ; | ||
| VMware | N/A | VMware vCenter version 4.1 ; | ||
| VMware | N/A | VMware vCOps version 5.0.2 ; | ||
| VMware | ESXi | VMware ESXi version 4.0 ; | ||
| VMware | N/A | VMware VirtualCenter version 2.5 ; | ||
| VMware | N/A | VMware Update Manager version 4.1 ; | ||
| VMware | ESXi | VMware ESXi version 5.0 ; | ||
| VMware | N/A | VMware ESX version 4.0 ; | ||
| VMware | N/A | VMware ESX version 3.5 ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ESX version 4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCO version 4.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter version 5.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCOps version 1.0.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi version 3.5 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Update Manager version 5.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Update Manager version 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCO version 4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi version 4.1 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter version 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter version 4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCOps version 5.0.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi version 4.0 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware VirtualCenter version 2.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Update Manager version 4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi version 5.0 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX version 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX version 3.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1833"
},
{
"name": "CVE-2012-0050",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0050"
},
{
"name": "CVE-2011-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4132"
},
{
"name": "CVE-2011-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4609"
},
{
"name": "CVE-2012-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0207"
},
{
"name": "CVE-2011-5057",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5057"
},
{
"name": "CVE-2010-4252",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4252"
},
{
"name": "CVE-2011-4619",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4619"
},
{
"name": "CVE-2012-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
},
{
"name": "CVE-2011-4576",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4576"
},
{
"name": "CVE-2011-2496",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2496"
},
{
"name": "CVE-2009-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5064"
},
{
"name": "CVE-2011-4577",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4577"
},
{
"name": "CVE-2009-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5029"
},
{
"name": "CVE-2012-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1569"
},
{
"name": "CVE-2011-4324",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4324"
},
{
"name": "CVE-2011-4110",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4110"
},
{
"name": "CVE-2011-4108",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4108"
},
{
"name": "CVE-2012-1583",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1583"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0060"
},
{
"name": "CVE-2012-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0391"
},
{
"name": "CVE-2011-4325",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4325"
},
{
"name": "CVE-2010-0830",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0830"
},
{
"name": "CVE-2012-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0061"
},
{
"name": "CVE-2010-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4180"
},
{
"name": "CVE-2012-0864",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0864"
},
{
"name": "CVE-2011-3209",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3209"
},
{
"name": "CVE-2010-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4410"
},
{
"name": "CVE-2012-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0392"
},
{
"name": "CVE-2012-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0394"
},
{
"name": "CVE-2012-0815",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0815"
},
{
"name": "CVE-2011-3188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3188"
},
{
"name": "CVE-2011-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1020"
},
{
"name": "CVE-2011-4109",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4109"
},
{
"name": "CVE-2012-1573",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1573"
},
{
"name": "CVE-2011-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4128"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2484"
},
{
"name": "CVE-2012-0393",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0393"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
},
{
"name": "CVE-2011-3363",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3363"
},
{
"name": "CVE-2011-2699",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2699"
},
{
"name": "CVE-2011-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0014"
},
{
"name": "CVE-2011-1089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1089"
}
],
"initial_release_date": "2012-09-03T00:00:00",
"last_revision_date": "2012-09-03T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-479",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-09-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eVMware\u003c/span\u003e. Elles concernent les \u00e9l\u00e9ments d\u0027\u00e9diteurs\ntiers impl\u00e9ment\u00e9s dans les solutions. Les \u00e9l\u00e9ments suivants ont \u00e9t\u00e9s mis\n\u00e0 jour :\n\n- Java Runtime Environment (JRE) ;\n- OpenSSL ;\n- le noyau ;\n- Perl ;\n- libxml2 ;\n- glibc ;\n- GnuTLS ;\n- popt et rpm ;\n- Apache struts.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2012-0013 du 30 ao\u00fbt 2012",
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0013.html"
}
]
}
CERTA-2012-AVI-393
Vulnerability from certfr_avis - Published: 2012-07-18 - Updated: 2012-07-18
Soixante-dix sept vulnérabilités ont été corrigées dans les produits Oracle. Elles concernent de nombreux composants et peuvent pour certaines être exploitées à distance. Le CERTA recommande de mettre à jour vos produits Oracle dès que possible.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle E-Business Suite Release 12 versions 12.0.4, 12.0.6, 12.1.1, 12.1.2 et 12.1.3 ; | ||
| Oracle | N/A | Oracle Identity Management 10g version 10.1.4.3 ; | ||
| Oracle | N/A | Oracle Sun Product Suite ; | ||
| Oracle | N/A | Oracle Application Server 10g Release 3 version 10.1.3.5 ; | ||
| Oracle | N/A | Oracle Database 10g Release 2 versions 10.2.0.3, 10.2.0.4 et 10.2.0.5 ; | ||
| Oracle | N/A | Oracle Siebel CRM versions 8.1.1 et 8.2.2 ; | ||
| Oracle | PeopleSoft | Oracle PeopleSoft Enterprise HRMS versions 9.0 et 9.1 ; | ||
| Oracle | N/A | Oracle Transportation Management versions 5.5.06, 6.0, 6.1 et 6.2 ; | ||
| Oracle | N/A | Oracle JRockit versions R28.2.3 et antérieures, R27.7.2 et antérieures ; | ||
| Oracle | N/A | Enterprise Manager Grid Control 11g Release 1 version 11.1.0.1 ; | ||
| Oracle | N/A | Oracle Secure Backup versions 10.3.0.3 et 10.4.0.1 ; | ||
| Oracle | N/A | Oracle AutoVue versions 20.0.2 et 20.1 ; | ||
| Oracle | N/A | Oracle Outside In Technology versions 8.3.5 et 8.3.7; | ||
| Oracle | N/A | Enterprise Manager Plugin pour Database 12c Release 1 versions 12.1.0.1 et 12.1.0.2 ; | ||
| Oracle | N/A | Oracle Fusion Middleware 11g Release 2 version 11.1.2.0 ; | ||
| Oracle | N/A | Oracle Map Viewer versions 10.1.3.1, 11.1.1.5 et 11.1.1.6 ; | ||
| Oracle | N/A | Oracle Clinical Remote Data Capture Option versions 4.6, 4.6.2 et 4.6.3 ; | ||
| Oracle | N/A | Oracle Database 11g Release 2 versions 11.2.0.2 et 11.2.0.3 ; | ||
| Oracle | N/A | Enterprise Manager Grid Control 10g Release 1 version 10.2.0.5 ; | ||
| Oracle | PeopleSoft | Oracle PeopleSoft Enterprise PeopleTools versions 8.50, 8.51 et 8.52 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 11i version 11.5.10.2 ; | ||
| Oracle | N/A | Hyperion BI+ version 11.1.1.x ; | ||
| Oracle | N/A | Oracle Fusion Middleware 11g Release 1 versions 11.1.1.5 et 11.1.1.6 ; | ||
| Oracle | N/A | Oracle Database 11g Release 1 version 11.1.0.7 ; | ||
| Oracle | MySQL | Oracle MySQL Server versions 5.1 et 5.5. |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle E-Business Suite Release 12 versions 12.0.4, 12.0.6, 12.1.1, 12.1.2 et 12.1.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Identity Management 10g version 10.1.4.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Sun Product Suite ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server 10g Release 3 version 10.1.3.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g Release 2 versions 10.2.0.3, 10.2.0.4 et 10.2.0.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Siebel CRM versions 8.1.1 et 8.2.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle PeopleSoft Enterprise HRMS versions 9.0 et 9.1 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Transportation Management versions 5.5.06, 6.0, 6.1 et 6.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit versions R28.2.3 et ant\u00e9rieures, R27.7.2 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Enterprise Manager Grid Control 11g Release 1 version 11.1.0.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Secure Backup versions 10.3.0.3 et 10.4.0.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle AutoVue versions 20.0.2 et 20.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Outside In Technology versions 8.3.5 et 8.3.7;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Enterprise Manager Plugin pour Database 12c Release 1 versions 12.1.0.1 et 12.1.0.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Fusion Middleware 11g Release 2 version 11.1.2.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Map Viewer versions 10.1.3.1, 11.1.1.5 et 11.1.1.6 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Clinical Remote Data Capture Option versions 4.6, 4.6.2 et 4.6.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 2 versions 11.2.0.2 et 11.2.0.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Enterprise Manager Grid Control 10g Release 1 version 10.2.0.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle PeopleSoft Enterprise PeopleTools versions 8.50, 8.51 et 8.52 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 11i version 11.5.10.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Hyperion BI+ version 11.1.1.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Fusion Middleware 11g Release 1 versions 11.1.1.5 et 11.1.1.6 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 1 version 11.1.0.7 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle MySQL Server versions 5.1 et 5.5.",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-3118",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3118"
},
{
"name": "CVE-2012-1770",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1770"
},
{
"name": "CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"name": "CVE-2012-1773",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1773"
},
{
"name": "CVE-2012-3124",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3124"
},
{
"name": "CVE-2012-1735",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1735"
},
{
"name": "CVE-2012-3110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3110"
},
{
"name": "CVE-2012-1736",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1736"
},
{
"name": "CVE-2012-1759",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1759"
},
{
"name": "CVE-2012-1767",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1767"
},
{
"name": "CVE-2012-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1766"
},
{
"name": "CVE-2012-1754",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1754"
},
{
"name": "CVE-2012-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3114"
},
{
"name": "CVE-2012-1730",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1730"
},
{
"name": "CVE-2012-1739",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1739"
},
{
"name": "CVE-2012-1765",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1765"
},
{
"name": "CVE-2012-1727",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1727"
},
{
"name": "CVE-2012-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3115"
},
{
"name": "CVE-2012-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3113"
},
{
"name": "CVE-2012-1740",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1740"
},
{
"name": "CVE-2012-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3121"
},
{
"name": "CVE-2012-1689",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1689"
},
{
"name": "CVE-2012-1769",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1769"
},
{
"name": "CVE-2012-1768",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1768"
},
{
"name": "CVE-2012-1742",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1742"
},
{
"name": "CVE-2012-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1762"
},
{
"name": "CVE-2012-3130",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3130"
},
{
"name": "CVE-2012-1732",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1732"
},
{
"name": "CVE-2012-3134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3134"
},
{
"name": "CVE-2012-3126",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3126"
},
{
"name": "CVE-2012-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1747"
},
{
"name": "CVE-2012-1733",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1733"
},
{
"name": "CVE-2012-3117",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3117"
},
{
"name": "CVE-2012-1744",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1744"
},
{
"name": "CVE-2012-1760",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1760"
},
{
"name": "CVE-2012-1772",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1772"
},
{
"name": "CVE-2012-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3106"
},
{
"name": "CVE-2011-3562",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3562"
},
{
"name": "CVE-2012-3128",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3128"
},
{
"name": "CVE-2012-1715",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1715"
},
{
"name": "CVE-2012-3135",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3135"
},
{
"name": "CVE-2012-1728",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1728"
},
{
"name": "CVE-2012-1757",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1757"
},
{
"name": "CVE-2012-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1749"
},
{
"name": "CVE-2012-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0563"
},
{
"name": "CVE-2012-1748",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1748"
},
{
"name": "CVE-2012-1687",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1687"
},
{
"name": "CVE-2012-1758",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1758"
},
{
"name": "CVE-2012-3112",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3112"
},
{
"name": "CVE-2012-1741",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1741"
},
{
"name": "CVE-2012-3109",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3109"
},
{
"name": "CVE-2012-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1752"
},
{
"name": "CVE-2012-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1729"
},
{
"name": "CVE-2012-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1771"
},
{
"name": "CVE-2012-3131",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3131"
},
{
"name": "CVE-2012-0540",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0540"
},
{
"name": "CVE-2012-1761",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1761"
},
{
"name": "CVE-2011-3368",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
},
{
"name": "CVE-2012-1738",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1738"
},
{
"name": "CVE-2012-3125",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3125"
},
{
"name": "CVE-2008-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4609"
},
{
"name": "CVE-2012-1756",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1756"
},
{
"name": "CVE-2012-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1737"
},
{
"name": "CVE-2012-1764",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1764"
},
{
"name": "CVE-2012-3111",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3111"
},
{
"name": "CVE-2012-3107",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3107"
},
{
"name": "CVE-2012-1753",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1753"
},
{
"name": "CVE-2012-3116",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3116"
},
{
"name": "CVE-2011-4358",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4358"
},
{
"name": "CVE-2011-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
},
{
"name": "CVE-2012-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1734"
},
{
"name": "CVE-2012-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1745"
},
{
"name": "CVE-2001-0323",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-0323"
},
{
"name": "CVE-2011-4885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
},
{
"name": "CVE-2011-2699",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2699"
},
{
"name": "CVE-2012-3120",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3120"
},
{
"name": "CVE-2012-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3108"
},
{
"name": "CVE-2012-1750",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1750"
},
{
"name": "CVE-2012-3127",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3127"
},
{
"name": "CVE-2012-1746",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1746"
},
{
"name": "CVE-2012-3122",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3122"
},
{
"name": "CVE-2012-3119",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3119"
},
{
"name": "CVE-2012-3129",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3129"
},
{
"name": "CVE-2012-3123",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3123"
},
{
"name": "CVE-2011-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
},
{
"name": "CVE-2012-1743",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1743"
},
{
"name": "CVE-2012-1731",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1731"
}
],
"initial_release_date": "2012-07-18T00:00:00",
"last_revision_date": "2012-07-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2012-392727 du 17 juillet 2012 :",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
}
],
"reference": "CERTA-2012-AVI-393",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Soixante-dix sept vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits\n\u003cspan class=\"textit\"\u003eOracle\u003c/span\u003e. Elles concernent de nombreux\ncomposants et peuvent pour certaines \u00eatre exploit\u00e9es \u00e0 distance. Le\nCERTA recommande de mettre \u00e0 jour vos produits \u003cspan\nclass=\"textit\"\u003eOracle\u003c/span\u003e d\u00e8s que possible.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2012-392727 du 17 juillet 2012",
"url": null
}
]
}
GHSA-69G3-QVQF-82HH
Vulnerability from github – Published: 2022-05-13 01:08 – Updated: 2022-05-13 01:08The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.
{
"affected": [],
"aliases": [
"CVE-2011-2699"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-05-24T23:55:00Z",
"severity": "HIGH"
},
"details": "The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.",
"id": "GHSA-69g3-qvqf-82hh",
"modified": "2022-05-13T01:08:39Z",
"published": "2022-05-13T01:08:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2699"
},
{
"type": "WEB",
"url": "https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723429"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=87c48fa3b4630905f98268dde838ee43626a060c"
},
{
"type": "WEB",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/5"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1027274"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.