EMC Documentum Content Server Multiple Vulnerabilities (ESA-2014-046)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by multiple vulnerabilities.

Description :

The remote host is running a version of EMC Documentum Content Server
that is affected by multiple vulnerabilities :

- A privilege escalation vulnerability exists due to
improper authorization checks. A remote, authenticated
attacker can exploit this vulnerability to access data
or execute commands with superuser privileges.
(CVE-2014-2506)

- A remote command injection vulnerability exists due to
a failure to properly validate user input. A remote,
authenticated attacker can exploit this vulnerability
to inject arbitrary shell commands.
(CVE-2014-2507)

- An information disclosure vulnerability exists due to a
flaw in the Documentum Query Language (DQL) engine. A
remote, authenticated attacker can exploit this
vulnerability to conduct DQL injection attacks and
read arbitrary data from the database. (CVE-2014-2508)

See also :

http://seclists.org/bugtraq/2014/Jun/att-50/ESA-2014-046.txt

Solution :

Apply the relevant patch referenced in the vendor advisory.

Risk factor :

High / CVSS Base Score : 8.5
(CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 77633 ()

Bugtraq ID: 67916
67917
67918

CVE ID: CVE-2014-2506
CVE-2014-2507
CVE-2014-2508

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now