First published: Wed Aug 20 2014(Updated: )
EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07 allows remote authenticated users to read sensitive object metadata via an RPC command.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Content Server | <=6.7 | |
EMC Documentum Content Server | =6.0 | |
EMC Documentum Content Server | =6.5 | |
EMC Documentum Content Server | =6.5-sp1 | |
EMC Documentum Content Server | =6.5-sp2 | |
EMC Documentum Content Server | =6.5-sp3 | |
EMC Documentum Content Server | =6.6 | |
EMC Documentum Content Server | =6.7 | |
EMC Documentum Content Server | =6.7-sp1 | |
EMC Documentum Content Server | =7.0 | |
EMC Documentum Content Server | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2521 has been classified as a medium severity vulnerability due to its potential impact on sensitive object metadata exposure.
To fix CVE-2014-2521, you should upgrade the EMC Documentum Content Server to version 6.7 SP2 P16 or 7.1 P07 or later.
CVE-2014-2521 affects remote authenticated users of EMC Documentum Content Server versions prior to 6.7 SP2 P16 and 7.x prior to 7.1 P07.
CVE-2014-2521 is a remote code execution vulnerability that allows unauthorized reading of sensitive metadata.
CVE-2014-2521 was publicly disclosed in 2014, prompting users to update their systems promptly.