First published: Wed Aug 20 2014(Updated: )
EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07 allows remote authenticated users to gain privileges via a user-created system object.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Content Server | <=6.7 | |
EMC Documentum Content Server | =6.0 | |
EMC Documentum Content Server | =6.5 | |
EMC Documentum Content Server | =6.5-sp1 | |
EMC Documentum Content Server | =6.5-sp2 | |
EMC Documentum Content Server | =6.5-sp3 | |
EMC Documentum Content Server | =6.6 | |
EMC Documentum Content Server | =6.7 | |
EMC Documentum Content Server | =6.7-sp1 | |
EMC Documentum Content Server | =7.0 | |
EMC Documentum Content Server | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4618 has been classified as having medium severity due to its potential to allow privilege escalation for authenticated users.
To fix CVE-2014-4618, update EMC Documentum Content Server to version 6.7 SP2 P16 or later for versions 6.7 and 7.1 P07 or later for 7.x.
CVE-2014-4618 affects all versions of EMC Documentum Content Server before 6.7 SP2 P16 and 7.x before 7.1 P07.
CVE-2014-4618 allows remote authenticated users to create system objects, which can lead to privilege escalation.
There is no specific information indicating that CVE-2014-4618 is being actively exploited, but vulnerable systems should be prioritized for updates.