SB2020022625 - RSA Authentication Manager update for third-party components



SB2020022625 - RSA Authentication Manager update for third-party components

Published: February 26, 2020 Updated: May 17, 2025

Security Bulletin ID SB2020022625
Severity
High
Patch available
YES
Number of vulnerabilities 17
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 29% Medium 24% Low 47%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 17 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2019-19531)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to use-after-free error in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.


2) Race condition (CVE-ID: CVE-2019-19537)

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.


3) Information disclosure (CVE-ID: CVE-2019-19535)

The vulnerability allows a local non-authenticated attacker to gain access to sensitive information.

In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.


4) Use-after-free (CVE-ID: CVE-2019-19527)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to use-after-free error in the drivers/hid/usbhid/hiddev.c driver. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.


5) Information disclosure (CVE-ID: CVE-2019-19533)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to an info-leak bug in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver. A local user with physical access can use a malicious USB device and gain unauthorized access to sensitive information on the system.


6) Out-of-bounds write (CVE-ID: CVE-2019-19532)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c. A local user with physical access can use a malicious USB device in the Linux kernel HID drivers, trigger out-of-bounds write and execute arbitrary code on the target system.


7) Use-after-free (CVE-ID: CVE-2019-19523)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to use-after-free error in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.


8) Use-after-free (CVE-ID: CVE-2019-19525)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to use-after-free error in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.


9) Resource management error (CVE-ID: CVE-2019-12625)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect processing of large zip archives. A remote attacker can send an overly large zip file and consume all available system resources.


10) Use-after-free (CVE-ID: CVE-2019-19524)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to use-after-free error in the drivers/input/ff-memless.c driver. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.


11) Use-after-free (CVE-ID: CVE-2019-19530)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to use-after-free error in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.


12) Information disclosure (CVE-ID: CVE-2019-19534)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output within the USB driver in drivers/net/can/usb/peak_usb/pcan_usb_core.c driver. A local use can use a specially crafted USB devices to gain unauthorized access to sensitive information on the system.


13) Information disclosure (CVE-ID: CVE-2019-19536)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in drivers/net/can/usb/peak_usb/pcan_usb_pro.c USB driver. A local user can use a specially crafted USB device to gain unauthorized access to sensitive information on the system.


14) Use-after-free (CVE-ID: CVE-2019-15213)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to use-after-free error in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver. A local user can use a malicious USB device to trigger use-after-free error and execute arbitrary code on the system with elevated privileges.


15) Memory leak (CVE-ID: CVE-2019-19052)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486. A remote attacker can perform a denial of service attack.


16) Input validation error (CVE-ID: CVE-2019-15961)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input passed via email messages due to overly long parsing of MIME messages. A remote attacker can send a specially crafted email message and perform a denial of service attack.


17) Out-of-bounds write (CVE-ID: CVE-2019-12900)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the BZ2_decompress() function in decompress.c. A remote attacker can create a specially crafted archive, trick the victim into opening it using the affected library, trigger out-of-bounds write and execute arbitrary code on the target system.

Remediation

Install update from vendor's website.