First published: Tue Dec 30 2014(Updated: )
Unquoted Windows search path vulnerability in EMC Replication Manager through 5.5.2 and AppSync before 2.1.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC AppSync | <=2.0 | |
EMC Replication Manager | <=5.5.2 | |
EMC Replication Manager | =5.0 | |
EMC Replication Manager | =5.1 | |
EMC Replication Manager | =5.2 | |
EMC Replication Manager | =5.3 | |
EMC Replication Manager | =5.4 | |
EMC Replication Manager | =5.4.3 | |
EMC Replication Manager | =5.5 | |
EMC Replication Manager | =5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4634 has a medium severity rating due to its potential to allow local privilege escalation.
To fix CVE-2014-4634, update EMC Replication Manager to version 5.5.3 or later, and AppSync to version 2.1.0 or later.
CVE-2014-4634 affects local users of EMC Replication Manager versions up to 5.5.2 and AppSync versions prior to 2.1.0.
The potential impacts of CVE-2014-4634 include unauthorized privilege escalation, allowing local users to execute malicious applications.
No, CVE-2014-4634 can only be exploited by local users with access to the affected systems.