The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of RSA Authentication Manager

vulnerability bulletin CVE-2018-20836

Linux kernel: use after free via smp_task_timedout

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via smp_task_timedout() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Linux, openSUSE Leap, RSA Authentication Manager, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, denial of service on server.
Provenance: user shell.
Creation date: 12/07/2019.
Identifiers: CERTFR-2019-AVI-330, CERTFR-2019-AVI-337, CERTFR-2019-AVI-346, CERTFR-2019-AVI-354, CERTFR-2019-AVI-381, CERTFR-2019-AVI-392, CVE-2018-20836, DLA-1884-1, DLA-1885-1, DSA-2019-133, DSA-4495-1, DSA-4497-1, openSUSE-SU-2019:1716-1, openSUSE-SU-2019:1757-1, SUSE-SU-2019:14127-1, SUSE-SU-2019:1823-1, SUSE-SU-2019:1823-2, SUSE-SU-2019:1851-1, SUSE-SU-2019:1852-1, SUSE-SU-2019:1854-1, SUSE-SU-2019:1855-1, SUSE-SU-2019:1870-1, USN-4076-1, VIGILANCE-VUL-29763.

Description of the vulnerability

An attacker can force the usage of a freed memory area via smp_task_timedout() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2019-10639

Linux kernel: information disclosure via net_hash_mix

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via net_hash_mix() of the Linux kernel, in order to obtain sensitive information.
Impacted products: Debian, BIG-IP Hardware, TMOS, Linux, openSUSE Leap, RSA Authentication Manager, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: data reading.
Provenance: internet server.
Creation date: 08/07/2019.
Identifiers: CERTFR-2019-AVI-330, CERTFR-2019-AVI-337, CERTFR-2019-AVI-392, CERTFR-2019-AVI-419, CERTFR-2019-AVI-441, CVE-2019-10639, DLA-1862-1, DLA-1885-1, DSA-2019-133, DSA-4497-1, K32804955, openSUSE-SU-2019:1716-1, openSUSE-SU-2019:1757-1, SUSE-SU-2019:1823-1, SUSE-SU-2019:1823-2, SUSE-SU-2019:1851-1, SUSE-SU-2019:1852-1, SUSE-SU-2019:1854-1, SUSE-SU-2019:1855-1, USN-4115-1, USN-4115-2, USN-4118-1, VIGILANCE-VUL-29705.

Description of the vulnerability

An attacker can bypass access restrictions to data via net_hash_mix() of the Linux kernel, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2019-10638

Linux kernel: information disclosure via IP ID Tracking

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via IP ID Tracking of the Linux kernel, in order to obtain sensitive information.
Impacted products: Debian, Linux, openSUSE Leap, RSA Authentication Manager, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: data reading.
Provenance: internet server.
Creation date: 08/07/2019.
Identifiers: CERTFR-2019-AVI-330, CERTFR-2019-AVI-337, CERTFR-2019-AVI-381, CERTFR-2019-AVI-392, CERTFR-2019-AVI-419, CERTFR-2019-AVI-441, CVE-2019-10638, DLA-1884-1, DLA-1885-1, DSA-2019-133, DSA-4495-1, DSA-4497-1, openSUSE-SU-2019:1716-1, openSUSE-SU-2019:1757-1, SUSE-SU-2019:1823-1, SUSE-SU-2019:1823-2, SUSE-SU-2019:1851-1, SUSE-SU-2019:1852-1, SUSE-SU-2019:1854-1, SUSE-SU-2019:1855-1, USN-4114-1, USN-4115-1, USN-4115-2, USN-4116-1, USN-4117-1, USN-4118-1, VIGILANCE-VUL-29704.

Description of the vulnerability

An attacker can bypass access restrictions to data via IP ID Tracking of the Linux kernel, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2019-8457

SQLite: out-of-bounds memory reading via rtreenode

Synthesis of the vulnerability

An attacker can force a read at an invalid address via rtreenode() of SQLite, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: Fedora, openSUSE Leap, RSA Authentication Manager, SQLite, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: data reading, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 03/06/2019.
Identifiers: CVE-2019-8457, DSA-2019-133, FEDORA-2019-02b81266b7, FEDORA-2019-3377813d18, openSUSE-SU-2019:1645-1, SUSE-SU-2019:14083-1, SUSE-SU-2019:14120-1, SUSE-SU-2019:1522-1, SUSE-SU-2019:1601-1, USN-4004-1, USN-4004-2, USN-4019-1, USN-4019-2, VIGILANCE-VUL-29449.

Description of the vulnerability

An attacker can force a read at an invalid address via rtreenode() of SQLite, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2019-5435 CVE-2019-5436

curl: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of curl.
Impacted products: curl, Debian, Fedora, openSUSE Leap, RSA Authentication Manager, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: client access/rights, denial of service on client.
Provenance: intranet server.
Number of vulnerabilities in this bulletin: 2.
Creation date: 22/05/2019.
Identifiers: CVE-2019-5435, CVE-2019-5436, DLA-1804-1, DSA-2019-117, FEDORA-2019-3f5b6f0f97, FEDORA-2019-697de0501f, openSUSE-SU-2019:1492-1, openSUSE-SU-2019:1508-1, SSA:2019-142-01, SUSE-SU-2019:1357-1, SUSE-SU-2019:1357-2, SUSE-SU-2019:1363-1, SUSE-SU-2019:14064-1, USN-3993-1, USN-3993-2, VIGILANCE-VUL-29382.

Description of the vulnerability

An attacker can use several vulnerabilities of curl.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2019-11884

Linux kernel: information disclosure via Bluetooth hidp

Synthesis of the vulnerability

A local attacker can read a memory fragment via Bluetooth hidp of the Linux kernel, in order to obtain sensitive information.
Impacted products: Debian, Fedora, Linux, openSUSE Leap, RSA Authentication Manager, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 13/05/2019.
Identifiers: CERTFR-2019-AVI-277, CERTFR-2019-AVI-355, CERTFR-2019-AVI-368, CERTFR-2019-AVI-419, CVE-2019-11884, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-640f8d8dd1, FEDORA-2019-c36afa818c, FEDORA-2019-e6bf55e821, openSUSE-SU-2019:1404-1, openSUSE-SU-2019:1407-1, openSUSE-SU-2019:1479-1, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, USN-4068-1, USN-4068-2, USN-4069-1, USN-4069-2, USN-4076-1, USN-4118-1, VIGILANCE-VUL-29273.

Description of the vulnerability

A local attacker can read a memory fragment via Bluetooth hidp of the Linux kernel, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2019-9500 CVE-2019-9503

Linux kernel: buffer overflow via brcmf_wowl_nd_results

Synthesis of the vulnerability

An attacker can trigger a buffer overflow via brcmf_wowl_nd_results() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Fedora, Linux, openSUSE Leap, RHEL, RSA Authentication Manager, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service, denial of service on client.
Provenance: radio connection.
Number of vulnerabilities in this bulletin: 2.
Creation date: 25/04/2019.
Identifiers: CERTFR-2019-AVI-211, CERTFR-2019-AVI-212, CERTFR-2019-AVI-233, CERTFR-2019-AVI-277, CERTFR-2019-AVI-391, CERTFR-2019-AVI-428, CERTFR-2019-AVI-440, CVE-2019-9500, CVE-2019-9503, DLA-1799-1, DLA-1799-2, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-1b986880ea, FEDORA-2019-1e8a4c6958, FEDORA-2019-8219efa9f6, FEDORA-2019-87d807d7cb, openSUSE-SU-2019:1404-1, openSUSE-SU-2019:1407-1, openSUSE-SU-2019:1479-1, RHSA-2019:2600-01, RHSA-2019:2609-01, RHSA-2019:2703-01, RHSA-2019:2741-01, SUSE-SU-2019:1240-1, SUSE-SU-2019:1241-1, SUSE-SU-2019:1242-1, SUSE-SU-2019:1244-1, SUSE-SU-2019:1245-1, SUSE-SU-2019:1287-1, SUSE-SU-2019:1289-1, SUSE-SU-2019:1550-1, USN-3979-1, USN-3980-1, USN-3981-1, USN-3981-2, USN-4076-1, USN-4095-1, USN-4095-2, VIGILANCE-VUL-29128, VU#166939.

Description of the vulnerability

An attacker can trigger a buffer overflow via brcmf_wowl_nd_results() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2019-2024

Linux kernel: use after free via em28xx_dvb_fini

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via em28xx_dvb_fini() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Android OS, Linux, openSUSE Leap, RSA Authentication Manager, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 27/03/2019.
Identifiers: CERTFR-2019-AVI-131, CERTFR-2019-AVI-391, CERTFR-2019-AVI-419, CVE-2019-2024, DLA-1799-1, DLA-1799-2, DSA-2019-093, openSUSE-SU-2019:1085-1, openSUSE-SU-2019:1193-1, SUSE-SU-2019:0765-1, SUSE-SU-2019:0767-1, SUSE-SU-2019:0801-1, SUSE-SU-2019:0828-1, SUSE-SU-2019:0901-1, USN-4094-1, USN-4118-1, VIGILANCE-VUL-28871.

Description of the vulnerability

An attacker can force the usage of a freed memory area via em28xx_dvb_fini() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2019-8936

NTP.org: NULL pointer dereference via Authenticated Mode 6

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced via Authenticated Mode 6 of NTP.org, in order to trigger a denial of service.
Impacted products: Fedora, FreeBSD, AIX, Meinberg NTP Server, Data ONTAP 7-Mode, NTP.org, openSUSE Leap, Solaris, pfSense, RSA Authentication Manager, Slackware, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: denial of service on service, denial of service on client.
Provenance: user account.
Creation date: 08/03/2019.
Identifiers: 3565, bulletinapr2019, CVE-2019-8936, DSA-2019-093, FEDORA-2019-694e3aa4e8, FEDORA-2019-f781d5c4c6, FreeBSD-SA-19:04.ntp, NTAP-20190503-0001, openSUSE-SU-2019:1143-1, openSUSE-SU-2019:1158-1, SSA:2019-067-01, SUSE-SU-2019:0775-1, SUSE-SU-2019:0777-1, SUSE-SU-2019:0789-1, SUSE-SU-2019:13991-1, SUSE-SU-2019:14004-1, VIGILANCE-VUL-28701.

Description of the vulnerability

An attacker can force a NULL pointer to be dereferenced via Authenticated Mode 6 of NTP.org, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2019-3711

RSA Authentication Manager: privilege escalation via Previous Domain Password

Synthesis of the vulnerability

An attacker can bypass restrictions via Previous Domain Password of RSA Authentication Manager, in order to escalate his privileges.
Impacted products: RSA Authentication Manager.
Severity: 1/4.
Consequences: privileged access/rights, user access/rights.
Provenance: privileged account.
Creation date: 04/03/2019.
Identifiers: CVE-2019-3711, DSA-2019-038, VIGILANCE-VUL-28641.

Description of the vulnerability

An attacker can bypass restrictions via Previous Domain Password of RSA Authentication Manager, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about RSA Authentication Manager: