Search criteria

9 vulnerabilities found for N/A by Bluecoat

CERTFR-2016-AVI-237

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été corrigée dans les produitsBlueCoat. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Bluecoat N/A BlueCoat CacheFlow 3.4
Bluecoat N/A BlueCoat ProxySG 6.5
Bluecoat N/A BlueCoat ProxySG 6.6
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "BlueCoat CacheFlow 3.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "BlueCoat ProxySG 6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "BlueCoat ProxySG 6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "links": [],
  "reference": "CERTFR-2016-AVI-237",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2016-07-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans les produits\u003cspan\nclass=\"textit\"\u003eBlueCoat\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits BlueCoat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 BlueCoat SA130 du 14 juillet 2016",
      "url": "https://bto.bluecoat.com/security-advisory/sa130"
    }
  ]
}

CERTFR-2015-AVI-553

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été corrigées dans les produits Bluecoat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Bluecoat N/A Bluecoat MAA versions 4.2 et antérieures
Bluecoat N/A Bluecoat ProxySG versions antérieures à 6.6
Bluecoat N/A Bluecoat ProxySG versions antérieures à 6.5.8.8
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Bluecoat MAA versions 4.2 et ant\u00e9rieures",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Bluecoat ProxySG versions ant\u00e9rieures \u00e0 6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Bluecoat ProxySG versions ant\u00e9rieures \u00e0 6.5.8.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2015-4800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4800"
    },
    {
      "name": "CVE-2015-4862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4862"
    },
    {
      "name": "CVE-2015-4836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4836"
    },
    {
      "name": "CVE-2015-4905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4905"
    },
    {
      "name": "CVE-2015-4792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4792"
    },
    {
      "name": "CVE-2015-4864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4864"
    },
    {
      "name": "CVE-2015-4833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4833"
    },
    {
      "name": "CVE-2015-4866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4866"
    },
    {
      "name": "CVE-2015-4826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4826"
    },
    {
      "name": "CVE-2015-4858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4858"
    },
    {
      "name": "CVE-2015-4802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4802"
    },
    {
      "name": "CVE-2015-4861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4861"
    },
    {
      "name": "CVE-2015-4730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4730"
    },
    {
      "name": "CVE-2015-4895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4895"
    },
    {
      "name": "CVE-2015-4870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4870"
    },
    {
      "name": "CVE-2015-4910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4910"
    },
    {
      "name": "CVE-2015-4830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4830"
    },
    {
      "name": "CVE-2015-4879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4879"
    },
    {
      "name": "CVE-2015-4815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4815"
    },
    {
      "name": "CVE-2015-4890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4890"
    },
    {
      "name": "CVE-2015-4791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4791"
    },
    {
      "name": "CVE-2015-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4807"
    },
    {
      "name": "CVE-2015-4904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4904"
    },
    {
      "name": "CVE-2015-4766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4766"
    },
    {
      "name": "CVE-2015-4816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4816"
    },
    {
      "name": "CVE-2015-4819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4819"
    },
    {
      "name": "CVE-2015-4913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4913"
    }
  ],
  "links": [],
  "reference": "CERTFR-2015-AVI-553",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2015-12-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eBluecoat\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\nd\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Bluecoat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Bluecoat SA106 du 17 d\u00e9cembre 2015",
      "url": "https://bto.bluecoat.com/security-advisory/sa106"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Bluecoat SA107 du 17 d\u00e9cembre 2015",
      "url": "https://bto.bluecoat.com/security-advisory/sa107"
    }
  ]
}

CERTFR-2015-AVI-317

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été corrigées dans les produits BlueCoat. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Bluecoat N/A Blue Coat HSM Agent pour SafeNet Luna SP
Bluecoat N/A Management Center
Bluecoat N/A X-Series XOS
Bluecoat N/A IntelligenceCenter
Bluecoat N/A Director
Bluecoat N/A Content Analysis System
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Blue Coat HSM Agent pour SafeNet Luna SP",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Management Center",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "X-Series XOS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "IntelligenceCenter",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Director",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Content Analysis System",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2014-0075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0075"
    },
    {
      "name": "CVE-2014-0050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0050"
    },
    {
      "name": "CVE-2014-0119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0119"
    },
    {
      "name": "CVE-2014-0227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0227"
    },
    {
      "name": "CVE-2014-0230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0230"
    },
    {
      "name": "CVE-2014-0099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0099"
    },
    {
      "name": "CVE-2014-7810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-7810"
    },
    {
      "name": "CVE-2014-0095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0095"
    },
    {
      "name": "CVE-2014-0033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0033"
    },
    {
      "name": "CVE-2014-0096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0096"
    }
  ],
  "links": [],
  "reference": "CERTFR-2015-AVI-317",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2015-07-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eBlueCoat\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un contournement de la politique de s\u00e9curit\u00e9, une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits BlueCoat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 BlueCoat SA100 du 23 juillet 2015",
      "url": "https://bto.bluecoat.com/security-advisory/sa100"
    }
  ]
}

CERTFR-2015-AVI-259

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été corrigées dans les produits BlueCoat. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Bluecoat N/A PacketShaper S-Series 11.2, 11.3, et 11.4
Bluecoat N/A OPIC
Bluecoat N/A SSLV 3.7 et 3.8 versions antérieures à 3.8.2-418 et 3.8.3-120
Bluecoat N/A NSP 5.2 et 5.3
Bluecoat N/A Android Mobile Agent 1.x
Bluecoat N/A SA 6.6, 7.0, et 7.1
Bluecoat N/A ProxyClient 3.4
Bluecoat N/A PacketShaper 9.2
Bluecoat N/A Client Connector
Bluecoat N/A IntelligenceCenter 3.2 et 3.3
Bluecoat N/A ProxyAV 3.4 et 3.5
Bluecoat N/A SGOS 6.2 versions antérieures à 6.2.16.4, 6.5 versions antérieures à 6.5.7.5, et 6.6
Bluecoat N/A Reporter (Virtualized Reporter) 9.4
Bluecoat N/A NNP 5.2 et 5.3
Bluecoat N/A CAS 1.1 versions antérieures à 1.1.5.6 et 1.2 versions antérieures 1.2.4.4
Bluecoat N/A BCAAA 5.5 et 6.1
Bluecoat N/A CacheFlow 2.x et 3.x
Bluecoat N/A MAA 4.1 et 4.2
Bluecoat N/A MAG2
Bluecoat N/A ICSP 5.3
Bluecoat N/A Director 6.1 versions antérieures 6.1.19.1
Bluecoat N/A PolicyCenter 9.2
Bluecoat N/A Management Center versions antérieures 1.3.3.2
Bluecoat N/A Unified Agent 4.1
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "PacketShaper S-Series 11.2, 11.3, et 11.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "OPIC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "SSLV 3.7 et 3.8 versions ant\u00e9rieures \u00e0 3.8.2-418 et 3.8.3-120",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "NSP 5.2 et 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Android Mobile Agent 1.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "SA 6.6, 7.0, et 7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "ProxyClient 3.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "PacketShaper 9.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Client Connector",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "IntelligenceCenter 3.2 et 3.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "ProxyAV 3.4 et 3.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "SGOS 6.2 versions ant\u00e9rieures \u00e0 6.2.16.4, 6.5 versions ant\u00e9rieures \u00e0 6.5.7.5, et 6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Reporter (Virtualized Reporter) 9.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "NNP 5.2 et 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "CAS 1.1 versions ant\u00e9rieures \u00e0 1.1.5.6 et 1.2 versions ant\u00e9rieures 1.2.4.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "BCAAA 5.5 et 6.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "CacheFlow 2.x et 3.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "MAA 4.1 et 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "MAG2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "ICSP 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Director 6.1 versions ant\u00e9rieures 6.1.19.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "PolicyCenter 9.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Management Center versions ant\u00e9rieures 1.3.3.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Unified Agent 4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2015-0208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0208"
    },
    {
      "name": "CVE-2015-0292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
    },
    {
      "name": "CVE-2015-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
    },
    {
      "name": "CVE-2015-0288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
    },
    {
      "name": "CVE-2015-0290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0290"
    },
    {
      "name": "CVE-2015-0207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0207"
    },
    {
      "name": "CVE-2015-0285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0285"
    },
    {
      "name": "CVE-2015-0293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
    },
    {
      "name": "CVE-2015-0287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
    },
    {
      "name": "CVE-2015-1787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-1787"
    },
    {
      "name": "CVE-2015-0209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
    },
    {
      "name": "CVE-2015-0291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0291"
    },
    {
      "name": "CVE-2015-0289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
    }
  ],
  "links": [],
  "reference": "CERTFR-2015-AVI-259",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2015-06-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eBlueCoat\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits BlueCoat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 BlueCoat SA92 du 16 juin 2015",
      "url": "https://bto.bluecoat.com/security-advisory/sa92"
    }
  ]
}

CERTFR-2015-AVI-181

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été corrigées dans BlueCoat Malware Analysis Appliance (MAA). Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Bluecoat N/A BlueCoat Malware Analysis Appliance versions antérieures à 4.2.4
Bluecoat N/A BlueCoat Malware Analyzer G2 versions 3.5 et antérieures
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "BlueCoat Malware Analysis Appliance versions ant\u00e9rieures \u00e0 4.2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "BlueCoat Malware Analyzer G2 versions 3.5 et ant\u00e9rieures",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2015-0937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0937"
    },
    {
      "name": "CVE-2015-0938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0938"
    }
  ],
  "links": [],
  "reference": "CERTFR-2015-AVI-181",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2015-04-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eBlueCoat Malware Analysis Appliance (MAA)\u003c/span\u003e. Elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans BlueCoat Malware Analysis Appliance (MAA)",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 BlueCoat SA94 du 16 avril 2015",
      "url": "https://bto.bluecoat.com/security-advisory/sa94"
    }
  ]
}

CERTFR-2015-AVI-038

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été corrigée dans les produits BlueCoat. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Bluecoat N/A Unified Agent versions antérieures à 4.1.3.151952
Bluecoat N/A ProxyClient versions antérieures à 3.4.4.10
Bluecoat N/A ProxyClient versions antérieures à 3.3.3.3
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Unified Agent versions ant\u00e9rieures \u00e0 4.1.3.151952",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "ProxyClient versions ant\u00e9rieures \u00e0 3.4.4.10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "ProxyClient versions ant\u00e9rieures \u00e0 3.3.3.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "links": [],
  "reference": "CERTFR-2015-AVI-038",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2015-01-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans les produits \u003cspan\nclass=\"textit\"\u003eBlueCoat\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits BlueCoat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 BlueCoat sa89 du 23 janvier 2015",
      "url": "https://bto.bluecoat.com/security-advisory/sa89"
    }
  ]
}

CERTFR-2015-AVI-024

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été corrigées dans les produits BlueCoat. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Bluecoat N/A ProxyAV version 3.5 et antérieures
Bluecoat N/A NNP 5.x
Bluecoat N/A XOS version 10.0 et postérieures
Bluecoat N/A ICSP 5.x
Bluecoat N/A Security Analytics 6.6.9 et 7.1.5
Bluecoat N/A MAA 4.1.x
Bluecoat N/A SSLV version 3.8.x et antérieures
Bluecoat N/A MAG2
Bluecoat N/A NSP 5.x
Bluecoat N/A Director 6.x
Bluecoat N/A Management Center 1.x version antérieures à 1.2
Bluecoat N/A SGOS 6.x
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ProxyAV version 3.5 et ant\u00e9rieures",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "NNP 5.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "XOS version 10.0 et post\u00e9rieures",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "ICSP 5.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Security Analytics 6.6.9 et 7.1.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "MAA 4.1.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "SSLV version 3.8.x et ant\u00e9rieures",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "MAG2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "NSP 5.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Director 6.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Management Center 1.x version ant\u00e9rieures \u00e0 1.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "SGOS 6.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2014-3567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3567"
    },
    {
      "name": "CVE-2014-3513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3513"
    },
    {
      "name": "CVE-2014-3568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3568"
    }
  ],
  "links": [],
  "reference": "CERTFR-2015-AVI-024",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2015-01-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eBlueCoat\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits BlueCoat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 BlueCoat SA87 du 14 janvier 2015",
      "url": "https://bto.bluecoat.com/security-advisory/sa87"
    }
  ]
}

CERTA-2012-AVI-729

Vulnerability from certfr_avis - Published: - Updated:

Deux vulnérabilités ont été corrigées dans Bluecoat. Elles concernent un débordement de tampon en mémoire dans le module OpenSSL et peut être provoqué par un message DER spécialement conçu.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Bluecoat N/A Bluecoat ProxySG
Bluecoat N/A Bluecoat IntelligenceCenter

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Bluecoat ProxySG",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "Bluecoat IntelligenceCenter",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2012-2110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
    },
    {
      "name": "CVE-2012-2131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2131"
    }
  ],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 SA70 du 04 d\u00e9cembre 2012 :",
      "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA70"
    }
  ],
  "reference": "CERTA-2012-AVI-729",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-12-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Deux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eBluecoat\u003c/span\u003e. Elles concernent un d\u00e9bordement de\ntampon en m\u00e9moire dans le module \u003cspan class=\"textit\"\u003eOpenSSL\u003c/span\u003e et\npeut \u00eatre provoqu\u00e9 par un message DER sp\u00e9cialement con\u00e7u.\n",
  "title": "Vuln\u00e9rabilit\u00e9s dans Bluecoat IntelligenceCenter et ProxySG",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Bluecoat SA70 du 04 d\u00e9cembre 2012",
      "url": null
    }
  ]
}

CERTA-2011-AVI-052

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité dans les produits BlueCoat permet à un attaquant de contourner la politique de sécurité et d'intercepter des données.

Description

L'implémentation de SSL dans les produits BlueCoat inclut une version vulnérable de OpenSSL. Un attaquant peut tenter de baisser le niveau de chiffrement et d'intercepter des données sensibles comme les identifiants de session.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Bluecoat N/A BlueCoat ProxySG versions antérieures à 6.1.2.1.
Bluecoat N/A BlueCoat CacheFlow versions antérieures à 2.1.4.7 ;

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "BlueCoat ProxySG versions ant\u00e9rieures \u00e0 6.1.2.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    },
    {
      "description": "BlueCoat CacheFlow versions ant\u00e9rieures \u00e0 2.1.4.7 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Bluecoat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nL\u0027impl\u00e9mentation de SSL dans les produits BlueCoat inclut une version\nvuln\u00e9rable de OpenSSL. Un attaquant peut tenter de baisser le niveau de\nchiffrement et d\u0027intercepter des donn\u00e9es sensibles comme les\nidentifiants de session.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2010-4180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4180"
    }
  ],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA53 du 31 janvier 2011 :      https://kb.bluecoat.com/index?page=content\u0026id=SA53",
      "url": "http://kb.bluecoat.com/index?page=content\u0026id=SA53"
    }
  ],
  "reference": "CERTA-2011-AVI-052",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2011-02-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans les produits BlueCoat permet \u00e0 un attaquant de\ncontourner la politique de s\u00e9curit\u00e9 et d\u0027intercepter des donn\u00e9es.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits BlueCoat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 BlueCoat SA53 du 31 janvier 2011",
      "url": null
    }
  ]
}