HIGH · 10.0

CVE-2008-3685

Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to uplo...

Vulnerability Description

Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to upload arbitrary files, and execute arbitrary code, via directory traversal sequences in requests to TCP port 2606.

CVSS Score

10.0

HIGH

AV:N/AC:L/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
EmcDocumentum Applicationxtender Workflow Manager<= 5.40

Related Weaknesses (CWE)

References

FAQ

What is CVE-2008-3685?

CVE-2008-3685 is a vulnerability with a CVSS score of 10.0 (HIGH). Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to uplo...

How severe is CVE-2008-3685?

CVE-2008-3685 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2008-3685?

Check the references section above for vendor advisories and patch information. Affected products include: Emc Documentum Applicationxtender Workflow Manager.