-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2320
           ESA-2015-144: EMC Documentum Content Server Privilege
                         Escalation Vulnerability
                             4 September 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          EMC Documentum Content Server
Publisher:        EMC
Operating System: Windows
                  Linux variants
                  HP-UX
                  Solaris
                  AIX
Impact/Access:    Administrator Compromise -- Existing Account
Resolution:       Patch/Upgrade
CVE Names:        CVE-2015-4544 CVE-2014-4626 

- --------------------------BEGIN INCLUDED TEXT--------------------

ESA-2015-144: EMC Documentum Content Server Privilege Escalation Vulnerability

EMC Identifier: ESA-2015-144

CVE Identifier: CVE-2015-4544

Severity Rating: CVSS v2 Base Score: 8.2 (AV:N/AC:M/Au:S/C:C/I:C/A:P)

Affected products:

EMC Documentum Content Server prior to 7.0

EMC Documentum Content Server 7.0

EMC Documentum Content Server 7.1

EMC Documentum Content Server 7.2

Summary:

EMC Documentum Content Server includes a Privilege Escalation Vulnerability 
that could potentially be exploited by malicious, regular users to perform 
certain actions as the superuser.

Details:

Unprivileged Content Server users may potentially escalate their privileges to
become a superuser by creating and performing malicious operations on dm_job 
objects. This is due to improper authorization checks being performed on such
objects and some of their attributes. The previous fix for CVE-2014-4626 was 
incomplete.

Resolution:

The following EMC Documentum Content Server release contains resolutions to 
these issues:

EMC Documentum Content Server 7.1P20 or later

EMC Documentum Content Server 7.2P04 or later

Customers on EMC Documentum Content Server prior to 7.0with extended support 
agreement are requested to raise hotfix requests through EMC Customer Support.

EMC recommends all customers upgrade at the earliest opportunity.

Document Content Server is continuing to develop a fix for the below version:

EMC Documentum Content Server 7.0.

This ESA will be updated when fixes are available for additional versions.

Link to remedies:

Registered EMC Online support customers can download the patches from 
https://emc.subscribenet.com/.

Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability.

EMC recommends that all users determine the applicability of this information
to their individual situations and take appropriate action. The information 
set forth herein is provided "as is" without warranty of any kind. EMC 
disclaims all warranties, either express or implied, including the warranties
of merchantability, fitness for a particular purpose, title and 
non-infringement. In no event, shall EMC or its suppliers, be liable for any 
damages whatsoever including direct, indirect, incidental, consequential, loss
of business profits or special damages, even if EMC or its suppliers have been
advised of the possibility of such damages. Some states do not allow the 
exclusion or limitation of liability for consequential or incidental damages,
so the foregoing limitation may not apply.

EMC Product Security Response Center

security_alert@emc.com

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=wYWB
-----END PGP SIGNATURE-----