CVE-2019-3598 – McAfee Agent update fixes a vulnerability in handling UDP requests
https://notcve.org/view.php?id=CVE-2019-3598
Buffer Access with Incorrect Length Value in McAfee Agent (MA) 5.x allows remote unauthenticated users to potentially cause a denial of service via specifically crafted UDP packets. Un acceso de búfer con valor de longitud incorrecto en McAfee Agent (MA) 5.x podría permitir a los usuarios remotos no autenticados provocar una denegación de servicio (DoS) mediante paquetes UDP especialmente manipulados. • http://www.securityfocus.com/bid/107205 https://kc.mcafee.com/corporate/index?page=content&id=SB10272 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2019-1559 – 0-byte record padding oracle
https://notcve.org/view.php?id=CVE-2019-1559
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). • http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00047.html http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00080.html http://www.securityfocus.com/bid/107174 https://access. • CWE-203: Observable Discrepancy CWE-325: Missing Cryptographic Step •
CVE-2018-6707 – McAfee Agent Insecure usage of temporary files vulnerability
https://notcve.org/view.php?id=CVE-2018-6707
Denial of Service through Resource Depletion vulnerability in the agent in non-Windows McAfee Agent (MA) 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to cause DoS, unexpected behavior, or potentially unauthorized code execution via knowledge of the internal trust mechanism. Vulnerabilidad de denegación de servicio (DoS) mediante consumo de recursos en el agente en plataformas no Windows de McAfee Agent (MA), desde la versión 5.0.0 a la 5.0.6, 5.5.0 y 5.5.1, permite que usuarios locales provoquen una denegación de servicio (DoS), un comportamiento inesperado o una ejecución de código no autorizada mediante el conocimiento del mecanismo interno de confianza. • http://www.securityfocus.com/bid/106307 https://kc.mcafee.com/corporate/index?page=content&id=SB10260 • CWE-400: Uncontrolled Resource Consumption •
CVE-2018-6706 – McAfee Agent (MA) non-Windows versions incorrect use of temporary file vulnerability
https://notcve.org/view.php?id=CVE-2018-6706
Insecure handling of temporary files in non-Windows McAfee Agent 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows an Unprivileged User to introduce custom paths during agent installation in Linux via unspecified vectors. El manejo inseguro de los archivos temporales en McAfee Agent para plataformas diferentes de Windows, desde la versión 5.0.0 hasta la 5.0.6, 5.5.0 y 5.5.1, permite que un usuario sin privilegios introduzca rutas personalizadas durante la instalación de agentes en Linux mediante vectores sin especificar. • http://www.securityfocus.com/bid/106328 https://kc.mcafee.com/corporate/index?page=content&id=SB10260 • CWE-377: Insecure Temporary File •
CVE-2018-6705 – McAfee Agent (MA) for Linux Privilege Escalation vulnerability
https://notcve.org/view.php?id=CVE-2018-6705
Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions. Vulnerabilidad de escalado de privilegios en McAfee Agent (MA) para Linux, desde la versión 5.0.0 hasta la 5.0.6, 5.5.0 y la 5.5.1, permite que usuarios locales ejecuten comandos arbitrarios mediante condiciones específicas. • http://www.securityfocus.com/bid/106328 https://kc.mcafee.com/corporate/index?page=content&id=SB10260 • CWE-377: Insecure Temporary File •