2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2014-2506" ,
"sourceIdentifier" : "security_alert@emc.com" ,
"published" : "2014-06-08T04:31:53.363" ,
"lastModified" : "2018-10-09T19:43:28.033" ,
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "EMC Documentum Content Server before 6.7 SP1 P28, 6.7 SP2 before P14, 7.0 before P15, and 7.1 before P05 allows remote authenticated users to obtain super-user privileges for system-object creation, and bypass intended restrictions on data access and server actions, via unspecified vectors."
} ,
{
"lang" : "es" ,
"value" : "EMC Documentum Content Server anterior a 6.7 SP1 P28, 6.7 SP2 anterior a P14, 7.0 anterior a P15 y 7.1 anterior a P05 permite a usuarios remotos autenticados obtener privilegios de super usuario para la creaci\u00f3n de objetos de sistema, y evadir restricciones de acceso a datos y acciones de servidor, a trav\u00e9s de vectores no especificados."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:S/C:C/I:C/A:C" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 8.5
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 6.8 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:documentum_content_server:*:sp1:*:*:*:*:*:*" ,
"versionEndIncluding" : "6.7" ,
"matchCriteriaId" : "7B188672-1EC2-4338-A868-BD562962D356"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:documentum_content_server:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FDBAEC8D-D945-48CA-84DD-EDBE8029F636"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:documentum_content_server:6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "730510E9-1AE8-44BF-A1DE-5ED40F22D0B6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:documentum_content_server:6.5:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC8840D2-5DE8-4EB6-A03F-BFF1C8A9BF1B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:documentum_content_server:6.5:sp2:*:*:*:*:*:*" ,
"matchCriteriaId" : "3AC51C95-97DC-44B4-9935-9423CE60289A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:documentum_content_server:6.5:sp3:*:*:*:*:*:*" ,
"matchCriteriaId" : "0ACB8EDE-C6AF-4B85-83ED-74097A206B49"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:documentum_content_server:6.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "25CD1EE0-4E72-4C42-857B-AA45F0A17BBB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:documentum_content_server:6.7:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "49659818-958F-4B5E-8DA4-B592C67DD13F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:documentum_content_server:6.7:sp2:*:*:*:*:*:*" ,
"matchCriteriaId" : "B4E00544-98F6-439C-8F4D-822FCAE775CA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:documentum_content_server:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8335062A-5A8E-4076-B351-7DFA19CEC818"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:emc:documentum_content_server:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B283F797-6DAA-40E1-9FAB-16FCAA5241B4"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-06/0051.html" ,
"source" : "security_alert@emc.com"
} ,
{
"url" : "http://packetstormsecurity.com/files/126960/EMC-Documentum-Content-Server-Escalation-Injection.html" ,
"source" : "security_alert@emc.com"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/58954" ,
"source" : "security_alert@emc.com"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/archive/1/532596/100/0/threaded" ,
"source" : "security_alert@emc.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/67917" ,
"source" : "security_alert@emc.com"
} ,
{
"url" : "http://www.securitytracker.com/id/1030339" ,
"source" : "security_alert@emc.com"
}
]
}