First published: Wed Dec 17 2014(Updated: )
EMC Documentum Content Server before 6.7 SP1 P29, 6.7 SP2 before P18, 7.0 before P16, and 7.1 before P09 allows remote authenticated users to gain privileges by (1) placing a command in a dm_job object and setting this object's owner to a privileged user or placing a rename action in a dm_job_request object and waiting for a (2) dm_UserRename or (3) dm_GroupRename service task, aka ESA-2014-105. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2515.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Content Server | <=6.7 | |
EMC Documentum Content Server | =6.7 | |
EMC Documentum Content Server | =6.7-sp2 | |
EMC Documentum Content Server | =7.0 | |
EMC Documentum Content Server | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4626 is considered a medium severity vulnerability due to its exploitation potential by remote authenticated users.
To fix CVE-2014-4626, upgrade EMC Documentum Content Server to versions 6.7 SP1 P29 or newer, 6.7 SP2 P18 or newer, 7.0 P16 or newer, or 7.1 P09 or newer.
CVE-2014-4626 primarily affects remote authenticated users with the ability to create or manipulate certain objects within the EMC Documentum environment.
Exploiting CVE-2014-4626 allows a remote authenticated user to gain elevated privileges, potentially leading to unauthorized actions within the system.
Versions vulnerable to CVE-2014-4626 include EMC Documentum Content Server prior to 6.7 SP1 P29, 6.7 SP2 before P18, 7.0 before P16, and 7.1 before P09.