APP: EMC Documentum Content Server Remote Code Execution

This signature detects attempts to exploit a known vulnerability against EMC Documentum Content Server. A successful attack can lead to arbitrary code execution.

Extended Description

EMC Documentum Content Server before 6.7SP1 P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P02 does not properly check authorization and does not properly restrict object types, which allows remote authenticated users to run save RPC commands with super-user privileges, and consequently execute arbitrary code, via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2514.

Affected Products

Emc documentum_content_server

References

CVE: CVE-2015-4532

Short Name
APP:EMC-DOC-SERV-RCE
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
CVE-2015-4532 Code Content Documentum EMC Execution Remote Server
Release Date
09/08/2016
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3337
Port
TCP/51000
False Positive
Unknown
Vendors

Emc

CVSS Score

9.0

Found a potential security threat?