First published: Thu Aug 20 2015(Updated: )
Java Method Server (JMS) in EMC Documentum Content Server before 6.7SP1 P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P02, when __debug_trace__ is configured, allows remote authenticated users to gain super-user privileges by leveraging the ability to read a log file containing a login ticket.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Documentum Content Server | =6.7-sp1 | |
EMC Documentum Content Server | =6.7-sp2 | |
EMC Documentum Content Server | =7.0 | |
EMC Documentum Content Server | =7.1 | |
EMC Documentum Content Server | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4535 is classified as a critical vulnerability due to its potential to allow remote authenticated users to gain super-user privileges.
To fix CVE-2015-4535, upgrade EMC Documentum Content Server to the latest version that is not affected by this vulnerability.
CVE-2015-4535 affects users of EMC Documentum Content Server versions 6.7SP1, 6.7SP2, 7.0, 7.1, and 7.2 when __debug_trace__ is enabled.
The impact of CVE-2015-4535 is that it can lead to unauthorized elevation of privileges for remote authenticated users.
CVE-2015-4535 is exposed when the __debug_trace__ feature is configured in EMC Documentum Content Server.