Refine your search

5 vulnerabilities found for Reporter by Broadcom

CERTFR-2024-AVI-0942
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits Broadcom. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Broadcom Management Center - VA Management Center - VA versions antérieures à 7.3.23.1
Broadcom SG-S500 SG-S500 versions antérieures à 7.4.7.1
Broadcom SSL Visibility Appliance Software SSL Visibility Appliance Software versions antérieures à 7.4.7.1
Broadcom SSP-S410 SSP-S410 versions antérieures à 7.4.7.1
Broadcom SV-3800 SV-3800 versions antérieures à 7.4.7.1
Broadcom ProxySG Software - SGOS ProxySG Software - SGOS versions antérieures à 7.3.23.1
Broadcom CAS-S400 CAS-S400 versions antérieures à 7.3.23.1
Broadcom SG-S400-RP SG-S400-RP versions antérieures à 7.3.23.1
Broadcom SV-S550 SV-550 versions antérieures à 7.4.7.1
Broadcom SG-S200-40 SG-S200-40 versions antérieures à 7.4.7.1
Broadcom ProxySG Software - SGOS ProxySG Software - SGOS versions antérieures à 7.4.7.1
Broadcom ASG-S500 ASG-S500 versions antérieures à 7.3.23.1
Broadcom ASG-S200 ASG-S200 versions antérieures à 7.3.23.1
Broadcom Content Analysis Software Content Analysis Software versions antérieures à 7.4.7.1
Broadcom ISG Content Analysis ISG Content Analysis versions antérieures à 7.4.7.1
Broadcom Management Center Management Center versions antérieures à 7.4.7.1
Broadcom SV-2800 SV-2800 versions antérieures à 7.3.23.1
Broadcom Reporter Reporter versions antérieures à 7.4.7.1
Broadcom ASG-S500 ASG-S500 versions antérieures à 7.4.7.1
Broadcom SV-1800 SV-1800 versions antérieures à 7.4.7.1
Broadcom SV-3800 SV-3800 versions antérieures à 7.3.23.1
Broadcom ASG-S400 ASG-S400 versions antérieures à 7.4.7.1
Broadcom SV-1800 SV-1800 versions antérieures à 7.3.23.1
Broadcom ISG Proxy ISG Proxy versions antérieures à 7.3.23.1
Broadcom CAS-S500 CAS-S500 versions antérieures à 7.3.23.1
Broadcom SV-800 SV-800 versions antérieures à 7.3.23.1
Broadcom SG-S500-RP SG-S500-RP versions antérieures à 7.3.23.1
Broadcom ISG Proxy ISG Proxy versions antérieures à 7.4.7.1
Broadcom ISG Content Analysis ISG Content Analysis versions antérieures à 7.3.23.1
Broadcom SSP-S410 PLATFORM SSP-S410 PLATFORM versions antérieures à 7.4.7.1
Broadcom SV-S550 SV-550 versions antérieures à 7.3.23.1
Broadcom SV-2800 SV-2800 versions antérieures à 7.4.7.1
Broadcom SSP SSP versions antérieures à 7.3.23.1
Broadcom Reporter-VA Reporter-VA versions antérieures à 7.4.7.1
Broadcom Management Center Management Center versions antérieures à 7.3.23.1
Broadcom CAS-S200 CAS-S200 versions antérieures à 7.3.23.1
Broadcom SSP-S210 PLATFORM SSP-S210 PLATFORM versions antérieures à 7.3.23.1
Broadcom CAS-S200 CAS-S200 versions antérieures à 7.4.7.1
Broadcom CAS-S400 CAS-S400 versions antérieures à 7.4.7.1
Broadcom Management Center - VA Management Center - VA versions antérieures à 7.4.7.1
Broadcom SG-S200-RP SG-S200-RP versions antérieures à 7.4.7.1
Broadcom Reporter-VA Reporter-VA versions antérieures à 7.3.23.1
Broadcom SSP-S410 SSP-S410 versions antérieures à 7.3.23.1
Broadcom SG-S400-RP SG-S400-RP versions antérieures à 7.4.7.1
Broadcom SSP-S210 PLATFORM SSP-S210 PLATFORM versions antérieures à 7.4.7.1
Broadcom Reporter-S500 Reporter-S500 versions antérieures à 7.4.7.1
Broadcom ASG-S400 ASG-S400 versions antérieures à 7.3.23.1
Broadcom SG-S200 SG-S200 versions antérieures à 7.4.7.1
Broadcom ASG-S200 ASG-S200 versions antérieures à 7.4.7.1
Broadcom MC-S400-20 MC-S400-20 versions antérieures à 7.4.7.1
Broadcom SG-S200-40 SG-S200-40 versions antérieures à 7.3.23.1
Broadcom SSP SSP versions antérieures à 7.4.7.1
Broadcom SG-S500-RP SG-S500-RP versions antérieures à 7.4.7.1
Broadcom SV-800 SV-800 versions antérieures à 7.4.7.1
Broadcom Reporter-S500 Reporter-S500 versions antérieures à 7.3.23.1
Broadcom SSL Visibility Appliance Software SSL Visibility Appliance Software versions antérieures à 7.3.23.1
Broadcom CAS-S200-A1 CAS-S200-A1 versions antérieures à 7.4.7.1
Broadcom Reporter Reporter versions antérieures à 7.3.23.1
Broadcom CAS-S500 CAS-S500 versions antérieures à 7.4.7.1
Broadcom SSP-S410 PLATFORM SSP-S410 PLATFORM versions antérieures à 7.3.23.1
Broadcom SG-S400 SG-S400 versions antérieures à 7.4.7.1
Broadcom CAS-S200-A1 CAS-S200-A1 versions antérieures à 7.3.23.1
Broadcom SG-S500 SG-S500 versions antérieures à 7.3.23.1
Broadcom MC-S400-20 MC-S400-20 versions antérieures à 7.3.23.1
Broadcom SG-S200 SG-S200 versions antérieures à 7.3.23.1
Broadcom Content Analysis Software Content Analysis Software versions antérieures à 7.3.23.1
Broadcom SG-S200-RP SG-S200-RP versions antérieures à 7.3.23.1
Broadcom SG-S400 SG-S400 versions antérieures à 7.3.23.1
References
Bulletin de sécurité Broadcom 25157 2024-11-01 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Management Center - VA versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "Management Center - VA",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S500 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SG-S500",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSL Visibility Appliance Software versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SSL Visibility Appliance Software",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSP-S410 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SSP-S410",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SV-3800 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SV-3800",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ProxySG Software - SGOS versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "ProxySG Software - SGOS",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "CAS-S400 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "CAS-S400",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S400-RP versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SG-S400-RP",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SV-550 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SV-S550",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S200-40 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SG-S200-40",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ProxySG Software - SGOS versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "ProxySG Software - SGOS",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ASG-S500 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "ASG-S500",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ASG-S200 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "ASG-S200",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Content Analysis Software versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "Content Analysis Software",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ISG Content Analysis  versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "ISG Content Analysis",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Management Center versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "Management Center",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SV-2800 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SV-2800",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Reporter versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "Reporter",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ASG-S500 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "ASG-S500",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SV-1800 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SV-1800",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SV-3800 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SV-3800",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ASG-S400 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "ASG-S400",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SV-1800 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SV-1800",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ISG Proxy versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "ISG Proxy",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "CAS-S500 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "CAS-S500",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SV-800 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SV-800",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S500-RP versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SG-S500-RP",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ISG Proxy  versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "ISG Proxy",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ISG Content Analysis versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "ISG Content Analysis",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSP-S410 PLATFORM versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SSP-S410 PLATFORM",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SV-550 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SV-S550",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SV-2800 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SV-2800",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSP versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SSP",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Reporter-VA versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "Reporter-VA",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Management Center versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "Management Center",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "CAS-S200 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "CAS-S200",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSP-S210 PLATFORM versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SSP-S210 PLATFORM",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "CAS-S200 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "CAS-S200",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "CAS-S400 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "CAS-S400",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Management Center - VA versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "Management Center - VA",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S200-RP versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SG-S200-RP",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Reporter-VA versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "Reporter-VA",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSP-S410 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SSP-S410",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S400-RP versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SG-S400-RP",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSP-S210 PLATFORM versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SSP-S210 PLATFORM",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Reporter-S500 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "Reporter-S500",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ASG-S400 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "ASG-S400",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S200 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SG-S200",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "ASG-S200 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "ASG-S200",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "MC-S400-20 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "MC-S400-20",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S200-40 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SG-S200-40",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSP versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SSP",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S500-RP versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SG-S500-RP",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SV-800 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SV-800",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Reporter-S500 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "Reporter-S500",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSL Visibility Appliance Software versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SSL Visibility Appliance Software",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "CAS-S200-A1 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "CAS-S200-A1",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Reporter versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "Reporter",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "CAS-S500 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "CAS-S500",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSP-S410 PLATFORM versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SSP-S410 PLATFORM",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S400 versions ant\u00e9rieures \u00e0 7.4.7.1",
      "product": {
        "name": "SG-S400",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "CAS-S200-A1 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "CAS-S200-A1",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S500 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SG-S500",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "MC-S400-20 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "MC-S400-20",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S200 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SG-S200",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Content Analysis Software versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "Content Analysis Software",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S200-RP versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SG-S200-RP",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SG-S400 versions ant\u00e9rieures \u00e0 7.3.23.1",
      "product": {
        "name": "SG-S400",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-3596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
    }
  ],
  "initial_release_date": "2024-11-04T00:00:00",
  "last_revision_date": "2024-11-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0942",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Broadcom. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Broadcom",
  "vendor_advisories": [
    {
      "published_at": "2024-11-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Broadcom 25157",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25157"
    }
  ]
}

CERTFR-2014-AVI-404
Vulnerability from certfr_avis

De multiples vulnérabilités ont été corrigées dans Blue Coat. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Broadcom N/A MAA 1.1.x et 4.1.x
Broadcom N/A Director 6.x et 5.x
Broadcom Management Center Management Center 1.1 et 1.2
Broadcom Reporter Reporter's ISO 9.4
Broadcom N/A SA 7.1, 7.0, et 6.x
Broadcom N/A CAS 1.x
Broadcom N/A XOS
Broadcom N/A S-Series
Broadcom N/A MAG2
Broadcom N/A SSL Visibility
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "MAA 1.1.x et 4.1.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Director 6.x et 5.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Management Center 1.1 et 1.2",
      "product": {
        "name": "Management Center",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Reporter\u0027s ISO 9.4",
      "product": {
        "name": "Reporter",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SA 7.1, 7.0, et 6.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "CAS 1.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "XOS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "S-Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "MAG2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "SSL Visibility",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2014-7169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
    },
    {
      "name": "CVE-2014-6271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
    }
  ],
  "initial_release_date": "2014-09-30T00:00:00",
  "last_revision_date": "2014-09-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2014-AVI-404",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2014-09-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eBlue Coat\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Blue Coat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA82 du 25 septembre 2014",
      "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82"
    }
  ]
}

CERTA-2012-AVI-056
Vulnerability from certfr_avis

Plusieurs vulnérabilités permettant à un utilisateur malintentionné de causer un déni de service, d'obtenir des informations sensibles et d'exécuter du code à distance sont présentes dans Blue Coat Reporter.

Description

Plusieurs vulnérabilités sont présentes dans Blue Coat Reporter. Elles concernent la version de la bibliothèque OpenSSL utilisée dans Blue Coat Reporter et permettent en outre de causer un déni de service, d'obtenir des informations sensibles et d'exécuter du code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Broadcom Reporter Blue Coat Reporter versions antérieures à 9.3.1.1.
Broadcom Reporter Blue Coat Reporter versions antérieures à 9.2.5.1 ;
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Blue Coat Reporter versions ant\u00e9rieures \u00e0 9.3.1.1.",
      "product": {
        "name": "Reporter",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "Blue Coat Reporter versions ant\u00e9rieures \u00e0 9.2.5.1 ;",
      "product": {
        "name": "Reporter",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans Blue Coat Reporter. Elles\nconcernent la version de la biblioth\u00e8que OpenSSL utilis\u00e9e dans Blue Coat\nReporter et permettent en outre de causer un d\u00e9ni de service, d\u0027obtenir\ndes informations sensibles et d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2010-3864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3864"
    },
    {
      "name": "CVE-2011-0014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0014"
    }
  ],
  "initial_release_date": "2012-02-03T00:00:00",
  "last_revision_date": "2012-02-03T00:00:00",
  "links": [],
  "reference": "CERTA-2012-AVI-056",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-02-03T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s permettant \u00e0 un utilisateur malintentionn\u00e9 de\ncauser un d\u00e9ni de service, d\u0027obtenir des informations sensibles et\nd\u0027ex\u00e9cuter du code \u00e0 distance sont pr\u00e9sentes dans \u003cspan\nclass=\"textit\"\u003eBlue Coat Reporter\u003c/span\u003e.\n",
  "title": "Vuln\u00e9rabilit\u00e9s dans Blue Coat Reporter",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA68 du 01 f\u00e9vrier 2012",
      "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA68"
    }
  ]
}

CERTA-2008-AVI-595
Vulnerability from certfr_avis

Une vulnérabilité de certains produits HP permet à une personne distante de réaliser un déni de service.

Description

Une vulnérabilité des produits HP utilisant le service HP OpenView Shared Trace permet à un utilisateur distant de réaliser un déni de service par le biais de plusieurs requêtes RPC spécifiquement conçues.

Solution

Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Broadcom N/A HP Performance Agent version vC.04.70.
Broadcom Reporter HP OpenView Reporter 3.7 sous Windows ;
Broadcom N/A HP OpenView Performance Agent versions vC.04.60 et vC.04.61 ;
Broadcom Reporter HP Reporter 3.8 sous Windows ;

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "HP Performance Agent version vC.04.70.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Reporter 3.7 sous Windows ;",
      "product": {
        "name": "Reporter",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Performance Agent versions vC.04.60 et vC.04.61 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "HP Reporter 3.8 sous Windows ;",
      "product": {
        "name": "Reporter",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 des produits HP utilisant le service HP OpenView\nShared Trace permet \u00e0 un utilisateur distant de r\u00e9aliser un d\u00e9ni de\nservice par le biais de plusieurs requ\u00eates RPC sp\u00e9cifiquement con\u00e7ues.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2007-4349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-4349"
    }
  ],
  "initial_release_date": "2008-12-11T00:00:00",
  "last_revision_date": "2008-12-11T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP c01612418 du 08 d\u00e9cembre 2008 :",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c01612418"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP c01621724 du 08 d\u00e9cembre 2008 :",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c01621724"
    }
  ],
  "reference": "CERTA-2008-AVI-595",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2008-12-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 de certains produits \u003cspan class=\"textit\"\u003eHP\u003c/span\u003e\npermet \u00e0 une personne distante de r\u00e9aliser un d\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans HP OpenView",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletins de s\u00e9curit\u00e9 HP c01612418 et 01621724 du 08 d\u00e9cembre 2008",
      "url": null
    }
  ]
}

CERTA-2007-AVI-351
Vulnerability from certfr_avis

Plusieurs applications de HP OpenView sont vulnérables à un débordement de mémoire.

Description

Un service partagé par plusieurs applications est vulnérable à un débordement de mémoire, ce qui rend les logiciels l'utilisant vulnérables. Un utilisateur malintentionné pourrait exploiter ces failles pour exécuter du code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Symfony process HP OpenView Service Desk Process Insight (SDPI) 2.x ;
N/A N/A HP OpenView Network Node Manager (NNM) 6.x ;
Symfony process HP Service Desk Process Insight (HPSDPI) 2.x.
Symfony process HP OpenView Business Process Insight (OVBPI) 2.x ;
N/A N/A HP OpenView Network Node Manager (NNM) 7.x ;
Microsoft Windows HP OpenView Operations Manager for Windows (OVOW) 7.x ;
Symfony process HP Business Process Insight (HPBPI) 2.x ;
Symfony process HP OpenView Service Desk Process Insight (SDPI) 1.x ;
Symfony process HP Service Desk Process Insight (HPSDPI) 1.x ;
N/A N/A HP OpenView Performance Manager (OVPM) 6.x ;
Broadcom Reporter HP OpenView Reporter 3.x ;
Symfony process HP OpenView Business Process Insight (OVBPI) 1.x ;
N/A N/A HP OpenView Performance Manager (OVPM) 5.x ;
Symfony process HP Business Process Insight (HPBPI) 1.x ;
N/A N/A HP OpenView Performance Insight (OVPI) 5.x ;
Symfony N/A HP OpenView Operations HTTPS Agent 8.x ;
Symfony N/A HP OpenView Internet Service (OVIS) 6.x ;
Symfony N/A HP OpenView Dashboard 2.x ;
N/A N/A HP OpenView Service Quality Manager (OV SQM) 1.x ;
N/A N/A HP OpenView Performance Agent ;

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "HP OpenView Service Desk Process Insight (SDPI) 2.x ;",
      "product": {
        "name": "process",
        "vendor": {
          "name": "Symfony",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Network Node Manager (NNM) 6.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP Service Desk Process Insight (HPSDPI) 2.x.",
      "product": {
        "name": "process",
        "vendor": {
          "name": "Symfony",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Business Process Insight (OVBPI) 2.x ;",
      "product": {
        "name": "process",
        "vendor": {
          "name": "Symfony",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Network Node Manager (NNM) 7.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Operations Manager for Windows (OVOW) 7.x ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "HP Business Process Insight (HPBPI) 2.x ;",
      "product": {
        "name": "process",
        "vendor": {
          "name": "Symfony",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Service Desk Process Insight (SDPI) 1.x ;",
      "product": {
        "name": "process",
        "vendor": {
          "name": "Symfony",
          "scada": false
        }
      }
    },
    {
      "description": "HP Service Desk Process Insight (HPSDPI) 1.x ;",
      "product": {
        "name": "process",
        "vendor": {
          "name": "Symfony",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Performance Manager (OVPM) 6.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Reporter 3.x ;",
      "product": {
        "name": "Reporter",
        "vendor": {
          "name": "Broadcom",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Business Process Insight (OVBPI) 1.x ;",
      "product": {
        "name": "process",
        "vendor": {
          "name": "Symfony",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Performance Manager (OVPM) 5.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP Business Process Insight (HPBPI) 1.x ;",
      "product": {
        "name": "process",
        "vendor": {
          "name": "Symfony",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Performance Insight (OVPI) 5.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Operations HTTPS Agent 8.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Symfony",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Internet Service (OVIS) 6.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Symfony",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Dashboard 2.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Symfony",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Service Quality Manager (OV SQM) 1.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenView Performance Agent ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUn service partag\u00e9 par plusieurs applications est vuln\u00e9rable \u00e0 un\nd\u00e9bordement de m\u00e9moire, ce qui rend les logiciels l\u0027utilisant\nvuln\u00e9rables. Un utilisateur malintentionn\u00e9 pourrait exploiter ces\nfailles pour ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2007-3872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-3872"
    }
  ],
  "initial_release_date": "2007-08-10T00:00:00",
  "last_revision_date": "2007-08-10T00:00:00",
  "links": [
    {
      "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt    2007 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01110627"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt    2007 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01114023"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt    2007 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109171"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt    2007 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01115068"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt    2007 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01112038"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt    2007 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01106515"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt    2007 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01111851"
    },
    {
      "title": "R\u00e9f\u00e9rence CVE CVE2007-3872:",
      "url": "http://cve.mitre.org/cgi-bin/cvename.cgi.name=CVE-2007-3872"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt    2007 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109617"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt    2007 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01114156"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt    2007 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109584"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt    2007 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01110576"
    }
  ],
  "reference": "CERTA-2007-AVI-351",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2007-08-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Plusieurs applications de HP OpenView sont vuln\u00e9rables \u00e0 un d\u00e9bordement\nde m\u00e9moire.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans HP OpenView",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletins de s\u00e9curit\u00e9 HP HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007",
      "url": null
    }
  ]
}