Lucene search

K
nessusThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.EMC_DOCUMENTUM_CONTENT_SERVER_ESA-2014-091.NASL
HistorySep 25, 2014 - 12:00 a.m.

EMC Documentum Content Server Multiple Privilege Escalation Vulnerabilities (ESA-2014-091)

2014-09-2500:00:00
This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
34

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

EPSS

0.003

Percentile

70.8%

The remote host is running a version of EMC Documentum Content Server that is affected by multiple vulnerabilities :

  • A privilege escalation vulnerability exists due to improper handling of system objects that allows a user to escalate their privileges to super-user status.
    (CVE-2014-4621)

  • A privilege escalation vulnerability exists due to improper handling of subgroups in the ‘dm_superusers’ group and other privileged groups. A user with sysadmin privileges can escalate their privileges to super-user status. (CVE-2014-4622)

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(77864);
  script_version("1.4");
  script_cvs_date("Date: 2019/11/25");

  script_cve_id("CVE-2014-4621", "CVE-2014-4622");
  script_bugtraq_id(69817, 69819);

  script_name(english:"EMC Documentum Content Server Multiple Privilege Escalation Vulnerabilities (ESA-2014-091)");
  script_summary(english:"Checks for Documentum Content Server.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple privilege escalation
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The remote host is running a version of EMC Documentum Content Server
that is affected by multiple vulnerabilities :

  - A privilege escalation vulnerability exists due to
    improper handling of system objects that allows a user
    to escalate their privileges to super-user status.
    (CVE-2014-4621)

  - A privilege escalation vulnerability exists due to
    improper handling of subgroups in the 'dm_superusers'
    group and other privileged groups. A user with sysadmin
    privileges can escalate their privileges to super-user
    status.  (CVE-2014-4622)");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2014/Sep/att-92/ESA-2014-091.txt");
  script_set_attribute(attribute:"solution", value:
"Apply the relevant patch referenced in the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/09/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/09/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/09/25");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:emc:documentum_content_server");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("emc_documentum_content_server_installed.nbin");
  script_require_keys("installed_sw/EMC Documentum Content Server");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("emc_documentum.inc");

app_name = DOC_APP_NAME;
install = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);

fixes = make_nested_list(
  make_list("7.1P08"),
  make_list("7.0P15" + DOC_HOTFIX),
  make_list("6.7SP2P17", DOC_NO_MIN)
);

documentum_check_and_report(install:install, fixes:fixes, severity:SECURITY_HOLE);

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

EPSS

0.003

Percentile

70.8%

Related for EMC_DOCUMENTUM_CONTENT_SERVER_ESA-2014-091.NASL