First published: Tue Apr 15 2014(Updated: )
EMC Documentum Content Server before 6.7 SP1 P26, 6.7 SP2 before P13, 7.0 before P13, and 7.1 before P02 allows remote authenticated users to bypass intended access restrictions and read metadata from certain folders via unspecified vectors.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Content Server | <=6.7 | |
EMC Documentum Content Server | =6.0 | |
EMC Documentum Content Server | =6.5 | |
EMC Documentum Content Server | =6.5-sp1 | |
EMC Documentum Content Server | =6.5-sp2 | |
EMC Documentum Content Server | =6.5-sp3 | |
EMC Documentum Content Server | =6.6 | |
EMC Documentum Content Server | =6.7 | |
EMC Documentum Content Server | =6.7-sp2 | |
EMC Documentum Content Server | =7.0 | |
EMC Documentum Content Server | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0642 is considered a moderate severity vulnerability as it allows remote authenticated users to bypass access restrictions.
To remediate CVE-2014-0642, you should upgrade to EMC Documentum Content Server version 6.7 SP1 P26 or later, 6.7 SP2 P13 or later, 7.0 P13 or later, or 7.1 P02 or later.
CVE-2014-0642 affects users of EMC Documentum Content Server versions prior to the specified patches across multiple versions including 6.0, 6.5, 6.6, 6.7, and 7.0.
CVE-2014-0642 allows remote authenticated users to read metadata from certain folders that they should not have access to.
Not addressing CVE-2014-0642 can lead to unauthorized access to sensitive metadata, potentially exposing confidential information.