First published: Thu Aug 20 2015(Updated: )
EMC Documentum Content Server before 6.7SP1 P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P02 does not properly check authorization and does not properly restrict object types, which allows remote authenticated users to run save RPC commands with super-user privileges, and consequently execute arbitrary code, via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2514.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Content Server | =6.7-sp1 | |
EMC Documentum Content Server | =6.7-sp2 | |
EMC Documentum Content Server | =7.0 | |
EMC Documentum Content Server | =7.1 | |
EMC Documentum Content Server | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4532 has a medium severity level due to its potential for privilege escalation.
To mitigate CVE-2015-4532, upgrade to EMC Documentum Content Server version 6.7SP1 P32, 6.7SP2 P25, 7.0 P19, 7.1 P16, or 7.2 P02 or later.
CVE-2015-4532 affects users of EMC Documentum Content Server versions prior to those specified in the fix.
The risks associated with CVE-2015-4532 include unauthorized execution of commands with elevated privileges by authenticated users.
As of now, there is no public evidence indicating the exploitation of CVE-2015-4532 in the wild.