First published: Thu Aug 20 2015(Updated: )
EMC Documentum Content Server before 6.7SP1 P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P02 does not properly check authorization for subgroups of privileged groups, which allows remote authenticated sysadmins to gain super-user privileges, and bypass intended restrictions on data access and server actions, via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4622.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Content Server | =6.7-sp1 | |
EMC Documentum Content Server | =6.7-sp2 | |
EMC Documentum Content Server | =7.0 | |
EMC Documentum Content Server | =7.1 | |
EMC Documentum Content Server | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4531 has a high severity rating due to its potential to allow unauthorized access to super-user privileges.
To fix CVE-2015-4531, upgrade to EMC Documentum Content Server versions 6.7 SP1 P32, 6.7 SP2 P25, 7.0 P19, 7.1 P16, or 7.2 P02 or later.
CVE-2015-4531 affects EMC Documentum Content Server versions 6.7, 7.0, 7.1, and 7.2 prior to their specific patched service packs.
The risks associated with CVE-2015-4531 include unauthorized privilege escalation, leading to potential data breaches and system compromise.
There are no confirmed workarounds for CVE-2015-4531; the recommended solution is to apply the appropriate patches as soon as possible.