Search criteria

2 vulnerabilities found for N/A by Broadcom

CERTFR-2014-AVI-404

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été corrigées dans Blue Coat. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Broadcom N/A MAA 1.1.x et 4.1.x
Broadcom N/A Director 6.x et 5.x
Broadcom Management Center Management Center 1.1 et 1.2
Broadcom Reporter Reporter's ISO 9.4
Broadcom N/A SA 7.1, 7.0, et 6.x
Broadcom N/A CAS 1.x
Broadcom N/A XOS
Broadcom N/A S-Series
Broadcom N/A MAG2
Broadcom N/A SSL Visibility
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "MAA 1.1.x et 4.1.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Director 6.x et 5.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Management Center 1.1 et 1.2",
      "product": {
        "name": "Management Center",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Reporter\u0027s ISO 9.4",
      "product": {
        "name": "Reporter",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SA 7.1, 7.0, et 6.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "CAS 1.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "XOS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "S-Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "MAG2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSL Visibility",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2014-7169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
    },
    {
      "name": "CVE-2014-6271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
    }
  ],
  "links": [],
  "reference": "CERTFR-2014-AVI-404",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2014-09-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eBlue Coat\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Blue Coat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA82 du 25 septembre 2014",
      "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82"
    }
  ]
}

CERTA-2008-AVI-595

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité de certains produits HP permet à une personne distante de réaliser un déni de service.

Description

Une vulnérabilité des produits HP utilisant le service HP OpenView Shared Trace permet à un utilisateur distant de réaliser un déni de service par le biais de plusieurs requêtes RPC spécifiquement conçues.

Solution

Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Broadcom N/A HP Performance Agent version vC.04.70.
Broadcom Reporter HP OpenView Reporter 3.7 sous Windows ;
Broadcom N/A HP OpenView Performance Agent versions vC.04.60 et vC.04.61 ;
Broadcom Reporter HP Reporter 3.8 sous Windows ;

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "HP Performance Agent version vC.04.70.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Reporter 3.7 sous Windows ;",
      "product": {
        "name": "Reporter",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Performance Agent versions vC.04.60 et vC.04.61 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "HP Reporter 3.8 sous Windows ;",
      "product": {
        "name": "Reporter",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 des produits HP utilisant le service HP OpenView\nShared Trace permet \u00e0 un utilisateur distant de r\u00e9aliser un d\u00e9ni de\nservice par le biais de plusieurs requ\u00eates RPC sp\u00e9cifiquement con\u00e7ues.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2007-4349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-4349"
    }
  ],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP c01612418 du 08 d\u00e9cembre 2008 :",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c01612418"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP c01621724 du 08 d\u00e9cembre 2008 :",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c01621724"
    }
  ],
  "reference": "CERTA-2008-AVI-595",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2008-12-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 de certains produits \u003cspan class=\"textit\"\u003eHP\u003c/span\u003e\npermet \u00e0 une personne distante de r\u00e9aliser un d\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans HP OpenView",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletins de s\u00e9curit\u00e9 HP c01612418 et 01621724 du 08 d\u00e9cembre 2008",
      "url": null
    }
  ]
}