Lucene search

K
nessusThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.EMC_DOCUMENTUM_CONTENT_SERVER_ESA-2014-064.NASL
HistorySep 11, 2014 - 12:00 a.m.

EMC Documentum Content Server Multiple Vulnerabilities (ESA-2014-064)

2014-09-1100:00:00
This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
35

CVSS2

8.2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:C/I:C/A:P

EPSS

0.009

Percentile

82.9%

The remote host is running a version of EMC Documentum Content Server that is affected by multiple vulnerabilities :

  • A remote code execution vulnerability exists due to improper authorization checks. A remote, authenticated attacker can exploit this vulnerability to execute arbitrary code via a custom script.
    (CVE-2014-2513)

  • A remote code execution vulnerability exists due to improper authorization checks. A remote, authenticated attacker can exploit this vulnerability to execute arbitrary code via save RPC commands.
    (CVE-2014-2514)

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(77634);
  script_version("1.5");
  script_cvs_date("Date: 2019/11/25");

  script_cve_id("CVE-2014-2513", "CVE-2014-2514");
  script_bugtraq_id(68435, 68436);

  script_name(english:"EMC Documentum Content Server Multiple Vulnerabilities (ESA-2014-064)");
  script_summary(english:"Checks for Documentum Content Server.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The remote host is running a version of EMC Documentum Content Server
that is affected by multiple vulnerabilities :

  - A remote code execution vulnerability exists due to
    improper authorization checks. A remote, authenticated
    attacker can exploit this vulnerability to execute
    arbitrary code via a custom script.
    (CVE-2014-2513)

  - A remote code execution vulnerability exists due to
    improper authorization checks. A remote, authenticated
    attacker can exploit this vulnerability to execute
    arbitrary code via save RPC commands.
    (CVE-2014-2514)");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2014/Jul/att-23/ESA-2014-064.txt");
  script_set_attribute(attribute:"solution", value:
"Apply the relevant patch referenced in the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/07/07");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/07/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/09/11");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:emc:documentum_content_server");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("emc_documentum_content_server_installed.nbin");
  script_require_keys("installed_sw/EMC Documentum Content Server");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("emc_documentum.inc");

app_name = DOC_APP_NAME;
get_install_count(app_name:app_name, exit_if_zero:TRUE);
install = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);

fixes = make_nested_list(
  make_list("7.1P06"),
  make_list("7.0P15"),
  make_list("6.7SP2P15"),
  make_list("6.7SP1P28", DOC_NO_MIN)
);

documentum_check_and_report(install:install, fixes:fixes, severity:SECURITY_HOLE);

CVSS2

8.2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:C/I:C/A:P

EPSS

0.009

Percentile

82.9%

Related for EMC_DOCUMENTUM_CONTENT_SERVER_ESA-2014-064.NASL