Multiple vulnerabilities in Symantec Endpoint Protection Manager



Published: 2020-02-13
Risk Low
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2020-5831
CVE-2020-5830
CVE-2020-5829
CVE-2020-5828
CVE-2020-5827
CWE-ID CWE-125
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Symantec Endpoint Protection Manager
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor Broadcom

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU25331

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-5831

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the "secars.dll" module. A local user can trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Symantec Endpoint Protection Manager: 14.0.0 MP2 - 14.2 RU2

CPE2.3 External links

http://support.symantec.com/us/en/article.SYMSA1505.html
http://www.zerodayinitiative.com/advisories/ZDI-20-225/


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Out-of-bounds read

EUVDB-ID: #VU25330

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-5830

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the "secars.dll" module. A local user can trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Symantec Endpoint Protection Manager: 14.0.0 MP2 - 14.2 RU2

CPE2.3 External links

http://support.symantec.com/us/en/article.SYMSA1505.html
http://www.zerodayinitiative.com/advisories/ZDI-20-224/


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Out-of-bounds read

EUVDB-ID: #VU25329

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-5829

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the "secars.dll" module. A local user can trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Symantec Endpoint Protection Manager: 14.0.0 MP2 - 14.2 RU2

CPE2.3 External links

http://support.symantec.com/us/en/article.SYMSA1505.html
http://www.zerodayinitiative.com/advisories/ZDI-20-223/


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Out-of-bounds read

EUVDB-ID: #VU25328

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-5828

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the "secars.dll" module. A local user can trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Symantec Endpoint Protection Manager: 14.0.0 MP2 - 14.2 RU2

CPE2.3 External links

http://support.symantec.com/us/en/article.SYMSA1505.html
http://www.zerodayinitiative.com/advisories/ZDI-20-222/


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Out-of-bounds read

EUVDB-ID: #VU25327

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-5827

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the "secars.dll" module. A local user can trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Symantec Endpoint Protection Manager: 14.0.0 MP2 - 14.2 RU2

CPE2.3 External links

http://support.symantec.com/us/en/article.SYMSA1505.html
http://www.zerodayinitiative.com/advisories/ZDI-20-220/


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###