First published: Tue Jul 08 2014(Updated: )
EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P15, 7.0 before P15, and 7.1 before P06 does not properly check authorization and does not properly restrict object types, which allows remote authenticated users to run save RPC commands with super-user privileges, and consequently execute arbitrary code, via unspecified vectors.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Content Server | <=6.7 | |
EMC Documentum Content Server | =6.7 | |
EMC Documentum Content Server | =6.7-sp2 | |
EMC Documentum Content Server | =7.0 | |
EMC Documentum Content Server | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2514 is classified as a high severity vulnerability due to its potential for unauthorized access to super-user privileges.
To remediate CVE-2014-2514, update EMC Documentum Content Server to version 6.7 SP1 P28 or later, 6.7 SP2 P15 or later, 7.0 P15 or later, or 7.1 P06 or later.
CVE-2014-2514 affects EMC Documentum Content Server versions prior to specified patches in 6.7, 7.0, and 7.1.
Attackers can exploit CVE-2014-2514 to execute save RPC commands with super-user privileges, leading to potential data compromise.
CVE-2014-2514 is a remote vulnerability that can be exploited by authenticated users.