First published: Thu Mar 06 2014(Updated: )
EMC Documentum TaskSpace (TSP) 6.7SP1 before P25 and 6.7SP2 before P11 does not properly handle the interaction between the dm_world group and the dm_superusers_dynamic group, which allows remote authenticated users to obtain sensitive information and gain privileges in opportunistic circumstances by leveraging an incorrect group-addition implementation.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum TaskSpace | =6.7-sp1 | |
EMC Documentum TaskSpace | =6.7-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0629 is classified as a high-severity vulnerability due to its potential to allow unauthorized privilege escalation.
To mitigate CVE-2014-0629, ensure you apply the latest patches for EMC Documentum TaskSpace, specifically P25 for 6.7SP1 and P11 for 6.7SP2.
CVE-2014-0629 affects users of EMC Documentum TaskSpace versions 6.7SP1 prior to P25 and 6.7SP2 prior to P11.
CVE-2014-0629 represents a privilege escalation and information disclosure vulnerability.
Yes, CVE-2014-0629 can only be exploited by remote authenticated users.